ash Ashley Madison Breach Extortion Scam Targets Hundreds By packetstormsecurity.com Published On :: Tue, 04 Feb 2020 14:39:23 GMT Full Article headline hacker privacy cybercrime data loss fraud
ash Adobe Flash Player Type Confusion Remote Code Execution By packetstormsecurity.com Published On :: Tue, 29 Apr 2014 02:01:15 GMT This Metasploit module exploits a type confusion vulnerability found in the ActiveX component of Adobe Flash Player. This vulnerability was found exploited in the wild in November 2013. This Metasploit module has been tested successfully on IE 6 to IE 10 with Flash 11.7, 11.8 and 11.9 prior to 11.9.900.170 over Windows XP SP3 and Windows 7 SP1. Full Article
ash Adobe Flash Player Integer Underflow Remote Code Execution By packetstormsecurity.com Published On :: Mon, 05 May 2014 19:05:06 GMT This Metasploit module exploits a vulnerability found in the ActiveX component of Adobe Flash Player before 12.0.0.43. By supplying a specially crafted swf file it is possible to trigger an integer underflow in several avm2 instructions, which can be turned into remote code execution under the context of the user, as exploited in the wild in February 2014. This Metasploit module has been tested successfully with Adobe Flash Player 11.7.700.202 on Windows XP SP3, Windows 7 SP1 and Adobe Flash Player 11.3.372.94 on Windows 8 even when it includes rop chains for several Flash 11 versions, as exploited in the wild. Full Article
ash Adobe Flash Active-X 28.0.0.137 Remote Code Execution By packetstormsecurity.com Published On :: Mon, 24 Dec 2018 04:44:44 GMT Adobe Flash Active-X plugin version 28.0.0.137 remote code execution proof of concept exploit. Full Article
ash Bash 5.0 Patch 11 Privilege Escalation By packetstormsecurity.com Published On :: Fri, 29 Nov 2019 16:40:01 GMT An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected. Full Article
ash Bash Profile Persistence By packetstormsecurity.com Published On :: Mon, 16 Dec 2019 16:05:47 GMT This Metasploit module writes an execution trigger to the target's Bash profile. The execution trigger executes a call back payload whenever the target user opens a Bash terminal. A handler is not run automatically, so you must configure an appropriate exploit/multi/handler to receive the callback. Full Article
ash FlashFXP 4.2.0 Build 1730 Denial Of Service By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:32:44 GMT FlashFXP version 4.2.0 build 1730 denial of service proof of concept exploit. Full Article
ash Anonymous Lashes Out At Norway Massacre Suspect By packetstormsecurity.com Published On :: Tue, 26 Jul 2011 04:32:40 GMT Full Article headline terror anonymous norway
ash XSS Vulnerabilities In 8 Million Flash Files By packetstormsecurity.com Published On :: Tue, 22 Dec 2009 09:16:16 GMT Full Article adobe xss
ash Adobe Updates Flash Player To Fix XSS Flaw By packetstormsecurity.com Published On :: Tue, 07 Jun 2011 03:23:00 GMT Full Article headline adobe xss
ash JUNOS (Juniper) Flaw Exposes Core Routers To Kernel Crash By packetstormsecurity.com Published On :: Wed, 06 Jan 2010 03:10:59 GMT Full Article flaw kernel juniper
ash Gulf Scheme Reveals BlackBerry SWP Tap-Cash Support By packetstormsecurity.com Published On :: Thu, 13 Oct 2011 03:19:59 GMT Full Article headline blackberry
ash Criminals Start Cashing In On Vulnerable WordPress Websites By packetstormsecurity.com Published On :: Thu, 23 Feb 2017 16:39:46 GMT Full Article headline cybercrime fraud flaw wordpress
ash NASA Hack: AnonSec Attempts To Crash $222m Drone, Release Secret Flight Videos And Employee Data By packetstormsecurity.com Published On :: Mon, 01 Feb 2016 16:45:05 GMT Full Article headline hacker government space data loss cyberwar spyware science nasa
ash Russian Plane Crash Possibly Fault Of ISIS Bomb By packetstormsecurity.com Published On :: Thu, 05 Nov 2015 00:55:41 GMT Full Article headline russia terror syria
ash Hashes Generation And Injection Tool By packetstormsecurity.com Published On :: Fri, 17 Aug 2012 03:07:26 GMT Hashes is a cross-platform tool that generates and injects different keys with the same hash code in order to test web applications against hash collision attacks. Written in Java. Has support for Java, PHP, ASP, and V8. Full Article
ash Travelex Customers Left In Cashless Limbo By packetstormsecurity.com Published On :: Thu, 09 Jan 2020 14:57:11 GMT Full Article headline bank cybercrime fraud
ash Hackers Race To Use Flash Exploit Before Vulnerable Systems Are Patched By packetstormsecurity.com Published On :: Sat, 21 Oct 2017 16:43:42 GMT Full Article headline hacker malware flaw cyberwar adobe
ash Sneaky Malware Disguises Itself As An Adobe Flash Installer By packetstormsecurity.com Published On :: Tue, 09 Jan 2018 16:57:35 GMT Full Article headline malware adobe
ash Nork Hackers Exploit Flash Bug To Pwn South Koreans By packetstormsecurity.com Published On :: Fri, 02 Feb 2018 16:17:34 GMT Full Article headline flaw cyberwar adobe korea
ash Adobe Patches Vulnerabilities In Flash, Dreamweaver By packetstormsecurity.com Published On :: Wed, 14 Mar 2018 14:00:00 GMT Full Article headline flaw adobe patch
ash Adobe Patches Critical Vulnerabilities In Flash, InDesign By packetstormsecurity.com Published On :: Wed, 11 Apr 2018 15:54:51 GMT Full Article headline flaw adobe patch
ash Flash! Ah-Ahhh! WebEx Pwned For All of Us! By packetstormsecurity.com Published On :: Thu, 19 Apr 2018 05:13:06 GMT Full Article headline flaw adobe cisco
ash Zero-Day Flash Exploit Targeting Middle East By packetstormsecurity.com Published On :: Fri, 08 Jun 2018 16:04:24 GMT Full Article headline malware flaw adobe
ash Fake Adobe Flash Updates Hide Malicious Crypto Miners By packetstormsecurity.com Published On :: Fri, 12 Oct 2018 15:07:14 GMT Full Article headline malware flaw adobe cryptography
ash Adobe Flash Zero-Day Leverages Active-X In Office Doc By packetstormsecurity.com Published On :: Thu, 06 Dec 2018 01:45:45 GMT Full Article headline malware flaw adobe
ash Adobe Squashes Critical Bugs In Acrobat, Reader By packetstormsecurity.com Published On :: Fri, 04 Jan 2019 16:12:07 GMT Full Article headline flaw adobe patch
ash Microsoft Culls Secret Flash Whitelist After Google Points Out Its Insecurity By packetstormsecurity.com Published On :: Thu, 21 Feb 2019 16:47:46 GMT Full Article headline malware microsoft google adobe
ash Adobe Patch Update Squashes Critical Code Execution Bugs By packetstormsecurity.com Published On :: Wed, 10 Apr 2019 15:01:38 GMT Full Article headline flaw adobe patch
ash Adobe Fixes Critical Security Flaws In Flash, ColdFusion, Campaign By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 15:28:03 GMT Full Article headline adobe patch
ash McAfee Claims Ashley Madison Hack Could Destabilize Society By packetstormsecurity.com Published On :: Fri, 24 Jul 2015 14:24:46 GMT Full Article headline hacker privacy data loss mcafee
ash Europol Smashes Romanian Credit Card Fraud Gang By packetstormsecurity.com Published On :: Fri, 29 Mar 2013 02:08:15 GMT Full Article headline cybercrime fraud romania
ash US Says Romanians Hacked Washington DC Police Cameras By packetstormsecurity.com Published On :: Fri, 29 Dec 2017 14:08:11 GMT Full Article headline hacker government privacy usa cyberwar romania
ash Cisco Zero-Day Exploited In The Wild To Crash And Reload Devices By packetstormsecurity.com Published On :: Thu, 01 Nov 2018 14:06:26 GMT Full Article headline hacker denial of service flaw cisco
ash Prestashop 1.7.6.4 XSS / CSRF / Remote Code Execution By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 21:26:17 GMT Prestashop versions 1.7.6.4 and below suffer from code execution, cross site request forgery, and cross site scripting vulnerabilities. Full Article
ash Equifax Owes You Cash For Losing Your Data By packetstormsecurity.com Published On :: Fri, 26 Jul 2019 15:54:45 GMT Full Article headline hacker privacy cybercrime data loss fraud identity theft
ash FlashGet 1.9.6 Buffer Overflow Proof Of Concept By packetstormsecurity.com Published On :: Sat, 02 May 2020 09:22:22 GMT FlashGet version 1.9.6 remote buffer overflow proof of concept exploit. Full Article
ash Guardian Told It Was Target Of Saudi Hacking Unit After Khashoggi Killing By packetstormsecurity.com Published On :: Wed, 26 Jun 2019 14:20:38 GMT Full Article headline hacker government privacy phone britain cyberwar spyware saudi arabia
ash Kimble Wins Back His Cars And Cash By packetstormsecurity.com Published On :: Sat, 19 Apr 2014 00:59:38 GMT Full Article headline government mpaa pirate new zealand
ash New iOS Text Bomb Bug Can Crash Your iPhone By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:34:04 GMT Full Article headline phone flaw apple
ash US And Russia Clash Over Power Grid Hack Attacks By packetstormsecurity.com Published On :: Tue, 18 Jun 2019 15:59:50 GMT Full Article headline government usa russia cyberwar scada
ash Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access By packetstormsecurity.com Published On :: Tue, 26 Nov 2013 01:52:43 GMT This Metasploit module exploits a vulnerability on Microsoft Silverlight. The vulnerability exists on the Initialize() method from System.Windows.Browser.ScriptObject, which access memory in an unsafe manner. Since it is accessible for untrusted code (user controlled) it's possible to dereference arbitrary memory which easily leverages to arbitrary code execution. In order to bypass DEP/ASLR a second vulnerability is used, in the public WriteableBitmap class from System.Windows.dll. This Metasploit module has been tested successfully on IE6 - IE10, Windows XP SP3 / Windows 7 SP1 on both x32 and x64 architectures. Full Article
ash NetBSD Stack Clash Proof Of Concept By packetstormsecurity.com Published On :: Thu, 29 Jun 2017 13:33:33 GMT NetBSD stack clash proof of concept exploit. Full Article
ash nfacct Bash Completion 1.1 By packetstormsecurity.com Published On :: Mon, 18 Apr 2016 03:33:33 GMT This is bash programmable completion for the netfilter.org accounting tool nfacct. Full Article
ash conntrack-tools Bash Completion 1.0 By packetstormsecurity.com Published On :: Mon, 18 Apr 2016 04:44:44 GMT This is bash programmable completion for the conntrack-tools from netfilter.org. The package contains completions for conntrack, conntrackd, and nfct. Full Article
ash IPTables Bash Completion 1.7 By packetstormsecurity.com Published On :: Mon, 27 Nov 2017 17:22:22 GMT iptables-bash_completion provides programmable completion for the iptables and ip6tables programs from netfilter.org. Following the logic of iptables, options are shown only if they are valid at the current context. Additionally to the completion on options, matches and targets, it supports dynamic retrieval of data from the system i.e: chain-, set-names, interfaces, hostnames, etc. Environment variables allow to fine grade completion options. IP and MAC addresses can be fed by file. Full Article
ash Google Squashes High Severity Flaws In Chrome Browser By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:16 GMT Full Article headline flaw google patch chrome
ash bash-perassi.patch By packetstormsecurity.com Published On :: Tue, 25 May 2004 22:59:48 GMT bup is a patch for bash that modifies the shell to send all user keystrokes via UDP over the network for collection by a sniffer or a syslogd server. It does not depend on syslogd to send the packets. It is part of the Tools/Data_Capture section of The Honeynet Project. Full Article
ash bash-3.1-perassi.patch By packetstormsecurity.com Published On :: Sat, 29 Apr 2006 10:36:12 GMT bup is a patch for bash that modifies the shell to send all user keystrokes via UDP over the network for collection by a sniffer or a syslogd server. It does not depend on syslogd to send the packets. It is part of the Tools/Data_Capture section of The Honeynet Project. Full Article
ash Bash Root Shell Backdoor By packetstormsecurity.com Published On :: Thu, 28 Jun 2012 15:13:21 GMT This patch is a backdoor to bash that will create a setuid backdoor shell in /tmp if run as root. Full Article