mi COVID-19: Bay Area Requires All 7 Million Residents To Shelter In Place By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 22:34:52 GMT Full Article headline government usa virus
mi Trump Administration's Lack Of A Unified Coronavirus Strategy Will Cost Lives, A Dozen Experts Say By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:05 GMT Full Article headline government usa virus
mi Trump Admin Threatens To Sue States That Don't Lift Orders By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:28:39 GMT Full Article headline government usa virus
mi From Zero Credentials To Full Domain Compromise By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 14:19:17 GMT Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials. Full Article
mi Packet Storm Advisory 2013-0819-2 - Adobe ColdFusion 9 Administrative Login Bypass By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:15:52 GMT Adobe ColdFusion versions 9.0, 9.0.1, and 9.0.2 do not properly check the "rdsPasswordAllowed" field when accessing the Administrator API CFC that is used for logging in. The login function never checks if RDS is enabled when rdsPasswordAllowed="true". This means that if RDS was not configured, the RDS user does not have a password associated with their username. This means by setting rdsPasswordAllowed to "true", we can bypass the admin login to use the rdsPassword, which in most cases, is blank. These details were purchased through the Packet Storm Bug Bounty program and are being released to the community. Full Article
mi Packet Storm Exploit 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 00:55:43 GMT This exploit leverages both invalid typecast and memory disclosure vulnerabilities in Microsoft Silverlight 5 in order to achieve code execution. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected". Full Article
mi Packet Storm Advisory 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 01:03:08 GMT Microsoft Silverlight 5 suffers from invalid typecast and memory disclosure vulnerabilities that, when leveraged together, allow for arbitrary code execution. A memory disclosure vulnerability exists in the public WriteableBitmap class from System.Windows.dll. This class allows reading of image pixels from the user-defined data stream via the public SetSource() method. BitmapSource.ReadStream() allocates and returns byte array and a count of array items as out parameters. These returned values are taken from the input stream and they can be fully controlled by the untrusted code. When returned "count" is greater than "array.Length", then data outside the "array" are used as input stream data by the native BitmapSource_SetSource() from agcore.dll. Later all data can be viewed via the public WriteableBitmap.Pixels[] property. Exploitation details related to these findings were purchased through the Packet Storm Bug Bounty program. Full Article
mi Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access By packetstormsecurity.com Published On :: Tue, 26 Nov 2013 01:52:43 GMT This Metasploit module exploits a vulnerability on Microsoft Silverlight. The vulnerability exists on the Initialize() method from System.Windows.Browser.ScriptObject, which access memory in an unsafe manner. Since it is accessible for untrusted code (user controlled) it's possible to dereference arbitrary memory which easily leverages to arbitrary code execution. In order to bypass DEP/ASLR a second vulnerability is used, in the public WriteableBitmap class from System.Windows.dll. This Metasploit module has been tested successfully on IE6 - IE10, Windows XP SP3 / Windows 7 SP1 on both x32 and x64 architectures. Full Article
mi Microsoft Windows Firewall Disabling Shellcode By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 23:02:22 GMT 644 bytes small Microsoft Windows x86 shellcode that disables the Windows firewall, adds the user MajinBuu with password TurnU2C@ndy!! to the system, adds the user MajinBuu to the local groups Administrators and Remote Desktop Users, and then enables the RDP Service. Full Article
mi QRadar Community Edition 7.3.1.6 Insecure File Permissions By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:09:24 GMT QRadar Community Edition version 7.3.1.6 suffers from a local privilege escalation due to insecure file permissions with run-result-reader.sh. Full Article
mi Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:11:57 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (CmResourceTypeDevicePrivate entries). Full Article
mi Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:13:09 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (videoprt.sys descriptors). Full Article
mi Microsoft Windows Kernel REG_RESOURCE_REQUIREMENTS_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:14:27 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_REQUIREMENTS_LIST registry values. Full Article
mi Microsoft Windows Desktop Bridge Privilege Escalation By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:22:57 GMT Microsoft Windows suffers from a Desktop Bridge Virtual Registry arbitrary file read / write privilege escalation vulnerability. Full Article
mi Microsoft Windows Desktop Bridge Privilege Escalation By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:24:41 GMT Microsoft Windows suffers from a Desktop Bridge Virtual Registry NtLoadKey arbitrary file read / write privilege escalation vulnerability. Full Article
mi Microsoft Windows Desktop Bridge Virtual Registry Incomplete Fix By packetstormsecurity.com Published On :: Wed, 20 Jun 2018 00:01:00 GMT The handling of the virtual registry for desktop bridge applications can allow an application to create arbitrary files as system resulting in privilege escalation. This is because the fix for CVE-2018-0880 (MSRC case 42755) did not cover all similar cases which were reported at the same time in the issue. Full Article
mi Microsoft Windows 10 UAC Bypass By computerDefault By packetstormsecurity.com Published On :: Mon, 22 Oct 2018 01:11:11 GMT This exploit permits an attacker to bypass UAC by hijacking a registry key during computerSecurity.exe (auto elevate windows binary) execution. Full Article
mi Microsoft Windows 10 User Sessions Stuck By packetstormsecurity.com Published On :: Tue, 30 Oct 2018 10:11:11 GMT This exploit modifies a windows language registry key which causes some windows binaries to stick, including login which makes the session unusable. The key is in HKCU and can be modified without admin rights, but with a bypass UAC, all user sessions can be paralyzed by using reg.exe and user's NTUSER.DAT. Full Article
mi Microsoft Windows .Reg File / Dialog Box Message Spoofing By packetstormsecurity.com Published On :: Mon, 11 Mar 2019 23:02:22 GMT The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its ability to show the default secondary status dialog box (Win 10), thereby hiding the fact that our attack was successful. Full Article
mi Microsoft Windows CmKeyBodyRemapToVirtualForEnum Arbitrary Key Enumeration By packetstormsecurity.com Published On :: Tue, 21 May 2019 23:00:00 GMT The Microsoft Windows kernel's Registry Virtualization does not safely open the real key for a virtualization location leading to enumerating arbitrary keys resulting in privilege escalation. Full Article
mi Trend Micro Security 2019 Security Bypass Protected Service Tampering By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:42:02 GMT Trend Micro Maximum Security is vulnerable to arbitrary code execution as it allows for creation of registry key to target a process running as SYSTEM. This can allow a malware to gain elevated privileges to take over and shutdown services that require SYSTEM privileges like Trend Micros "Asmp" service "coreServiceShell.exe" which does not allow Administrators to tamper with them. This could allow an attacker or malware to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. Note administrator privileges are required to exploit this vulnerability. Full Article
mi Microsoft Windows Kernel Privilege Escalation By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 23:02:22 GMT This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Tracing functionality used by the Routing and Remote Access service. The issue results from the lack of proper permissions on registry keys that control this functionality. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. Full Article
mi MicroStrategy Intelligence Server And Web 10.4 XSS / Disclosure / SSRF / Code Execution By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:50:46 GMT MicroStrategy Intelligence Server and Web version 10.4 suffers from remote code execution, cross site scripting, server-side request forgery, and information disclosure vulnerabilities. Full Article
mi Amiga Launches A $2,500 Quad-Core Lunchbox PC By packetstormsecurity.com Published On :: Fri, 23 Mar 2012 06:34:35 GMT Full Article headline commodore
mi Android Trojan Has Miner So Aggressive It Can Bork Your Battery By packetstormsecurity.com Published On :: Tue, 19 Dec 2017 14:22:11 GMT Full Article headline malware phone trojan flaw google
mi Dridex Banking Trojan Compromises FTP Sites In New Campaign By packetstormsecurity.com Published On :: Fri, 19 Jan 2018 15:48:28 GMT Full Article headline malware bank trojan cybercrime fraud
mi JhoneRAT Exploits Cloud To Attack Middle Eastern Countries By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:27:18 GMT Full Article headline malware trojan cyberwar
mi Never-Before-Seen Attackers Are Targeting Mideast Industrial Organizations By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:07:39 GMT Full Article headline hacker malware cyberwar scada
mi Charming Kitten Uses Fake Interview Requests To Target Public Figures By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:27:44 GMT Full Article headline cybercrime fraud phish
mi Spear-Phishing Campaign Compromises Executives At 150+ Companies By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:45:50 GMT Full Article headline hacker africa password phish
mi Sky News Admits Two Counts Of Computer Hacking By packetstormsecurity.com Published On :: Fri, 06 Apr 2012 02:54:50 GMT Full Article headline hacker britain data loss ireland
mi Microsoft Must Release Email Data Held On Dublin Server By packetstormsecurity.com Published On :: Mon, 28 Apr 2014 21:55:59 GMT Full Article headline government privacy microsoft email usa ireland
mi Microsoft Fights US Warrant For Customer Data Stored Overseas By packetstormsecurity.com Published On :: Wed, 11 Jun 2014 23:49:27 GMT Full Article headline government privacy microsoft usa ireland
mi Microsoft Refuses To Hand Over Foreign Data, Held In Contempt Of Court By packetstormsecurity.com Published On :: Fri, 12 Sep 2014 23:17:13 GMT Full Article headline government privacy microsoft usa data loss spyware ireland
mi Microsoft Fights Government Search Warrant By packetstormsecurity.com Published On :: Thu, 11 Dec 2014 22:54:53 GMT Full Article headline government privacy microsoft email usa ireland
mi Ireland Sides With Microsoft In Email Privacy Case By packetstormsecurity.com Published On :: Fri, 26 Dec 2014 15:39:00 GMT Full Article headline government privacy microsoft email usa ireland
mi Major Win For Microsoft In 'Free For All' Data Case By packetstormsecurity.com Published On :: Fri, 15 Jul 2016 04:51:36 GMT Full Article headline government privacy microsoft usa spyware ireland
mi Facebook Data Transfers To Be Examined By EU Court By packetstormsecurity.com Published On :: Thu, 12 Apr 2018 15:51:48 GMT Full Article headline government facebook social ireland
mi Pwn2Own Tokyo 2019 Victimize Sony, Samsung, And Amazon Devices By packetstormsecurity.com Published On :: Mon, 11 Nov 2019 15:12:06 GMT Full Article headline hacker amazon flaw sony conference japan samsung
mi Mitsubishi Electric Discloses Breach, China Suspected By packetstormsecurity.com Published On :: Mon, 20 Jan 2020 17:47:16 GMT Full Article headline hacker china data loss cyberwar japan military
mi Australia Sites Hacked Amid Spying Row With Indonesia By packetstormsecurity.com Published On :: Thu, 21 Nov 2013 16:06:34 GMT Full Article headline hacker government australia spyware anonymous indonesia
mi Australia Makes Pinkie-Promise To End Indonesia Spying By packetstormsecurity.com Published On :: Fri, 29 Aug 2014 15:36:15 GMT Full Article headline government australia spyware indonesia
mi 2015 UniCredit Data Breach Affects 3 Million Italian Clients By packetstormsecurity.com Published On :: Mon, 28 Oct 2019 16:58:05 GMT Full Article headline hacker privacy data loss italy
mi Microsoft Mocks Google For Failed Security Fix Deployment Methodology By packetstormsecurity.com Published On :: Thu, 19 Oct 2017 14:17:08 GMT Full Article headline microsoft flaw google chrome
mi Chrome Adds Ambitious Browser Mitigation For Spectre By packetstormsecurity.com Published On :: Fri, 13 Jul 2018 15:57:42 GMT Full Article headline flaw google patch chrome intel
mi Evernote Critical Flaw Opened Personal Data Of Millions To Attack By packetstormsecurity.com Published On :: Fri, 14 Jun 2019 16:08:21 GMT Full Article headline privacy flaw chrome
mi Launcher Execution Mitigation Patch By packetstormsecurity.com Published On :: Fri, 10 Jan 2020 02:33:33 GMT This patch mitigates allowing launcher the ability to execute arbitrary programs. Full Article
mi Iranians Resist Internet Censorship Amid Deadly Street Protests By packetstormsecurity.com Published On :: Tue, 02 Jan 2018 17:50:31 GMT Full Article headline government iran twitter censorship
mi Microsoft's Bing Search Engine Inaccessible In China By packetstormsecurity.com Published On :: Thu, 24 Jan 2019 15:33:05 GMT Full Article headline government microsoft china censorship
mi Vladimir Putin Signs Sweeping Internet Censorship Bills By packetstormsecurity.com Published On :: Tue, 19 Mar 2019 14:17:50 GMT Full Article headline government russia censorship