and Mandriva Linux Security Advisory 2007.232 By packetstormsecurity.com Published On :: Thu, 29 Nov 2007 01:19:35 GMT Mandriva Linux Security Advisory - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. The minix filesystem code allows local users to cause a denial of service (hang) via a malformed minix file stream. An integer underflow in the Linux kernel prior to 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set. Full Article
and CentOS-WebPanel.com Control Web Panel 0.9.8.836 Remote Command Execution By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:52:30 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.836 suffers from a remote command execution vulnerability. Full Article
and rConfig 3.9.2 Command Injection By packetstormsecurity.com Published On :: Thu, 07 Nov 2019 14:58:12 GMT This Metasploit module exploits an unauthenticated command injection vulnerability in rConfig versions 3.9.2 and prior. The install directory is not automatically removed after installation, allowing unauthenticated users to execute arbitrary commands via the ajaxServerSettingsChk.php file as the web server user. This module has been tested successfully on rConfig version 3.9.2 on CentOS 7.7.1908 (x64). Full Article
and Irish Passports Go RFID, And Naked By packetstormsecurity.com Published On :: Mon, 23 Oct 2006 05:11:44 GMT Full Article passport rfid ireland
and E-Borders Kills Off UK-Ireland Passport Free Travel By packetstormsecurity.com Published On :: Thu, 25 Oct 2007 09:57:49 GMT Full Article britain passport ireland
and Mandos Encrypted File System Unattended Reboot Utility 1.8.10 By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:10:50 GMT The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system. Full Article
and Linux 5.3 Insecure Root Path Handling By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 22:01:02 GMT Linux versions 5.3 and above appear to have an issue where io_uring suffers from insecure handling of the root directory for path lookups. Full Article
and TP-LINK Cloud Cameras NCXXX SetEncryptKey Command Injection By packetstormsecurity.com Published On :: Fri, 01 May 2020 23:55:55 GMT TP-LINK Cloud Cameras including products NC260 and NC450 suffer from a command injection vulnerability. The issue is located in the httpSetEncryptKeyRpm method (handler for /setEncryptKey.fcgi) of the ipcamera binary, where the user-controlled EncryptKey parameter is used directly as part of a command line to be executed as root without any input sanitization. Full Article
and TrixBox CE 2.8.0.4 Command Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:07:49 GMT This Metasploit module exploits an authenticated OS command injection vulnerability found in Trixbox CE versions 1.2.0 through 2.8.0.4 inclusive in the network POST parameter of the /maint/modules/endpointcfg/endpoint_devicemap.php page. Successful exploitation allows for arbitrary command execution on the underlying operating system as the asterisk user. Users can easily elevate their privileges to the root user however by executing sudo nmap --interactive followed by !sh from within nmap. Full Article
and WebAssembly Changes Could Ruin Meltdown And Spectre Patches By packetstormsecurity.com Published On :: Thu, 28 Jun 2018 00:30:32 GMT Full Article headline flaw patch intel
and Foreshadow And Intel SGX Software Attestation: The Whole Trust Model Collapses By packetstormsecurity.com Published On :: Wed, 15 Aug 2018 14:35:56 GMT Full Article headline flaw cryptography intel
and Kimble Sues New Zealand Government For Millions By packetstormsecurity.com Published On :: Fri, 13 Sep 2013 15:08:24 GMT Full Article headline government usa mpaa pirate new zealand
and Netherlands Court Orders End To Pirate Bay Ban By packetstormsecurity.com Published On :: Wed, 29 Jan 2014 16:00:05 GMT Full Article headline government netherlands pirate censorship
and Kimble Wins Back His Cars And Cash By packetstormsecurity.com Published On :: Sat, 19 Apr 2014 00:59:38 GMT Full Article headline government mpaa pirate new zealand
and Pirate Bay Co-Founder 'TiAMO' Arrested In Thailand By packetstormsecurity.com Published On :: Tue, 04 Nov 2014 14:29:13 GMT Full Article headline government riaa mpaa pirate sweden thailand
and Kim Dotcom Can Be Extradited, New Zealand High Court Rules By packetstormsecurity.com Published On :: Mon, 20 Feb 2017 15:32:00 GMT Full Article headline government usa fraud riaa mpaa pirate new zealand
and Coronavirus Tracking App Locks Up Android Phones For Ransom By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 14:23:02 GMT Full Article headline malware virus phone google
and Hand Over The Goodies, Brazil Tells Chocolate Factory By packetstormsecurity.com Published On :: Mon, 11 Nov 2013 16:08:36 GMT Full Article headline privacy google brazil
and Spying And Net Neutrality Dominate Debates In Brazil By packetstormsecurity.com Published On :: Mon, 28 Apr 2014 13:55:02 GMT Full Article headline government cyberwar spyware brazil
and Presidential Race In Brazil Marred By WhatsApp Scandal By packetstormsecurity.com Published On :: Fri, 19 Oct 2018 13:04:45 GMT Full Article headline government privacy phone facebook brazil
and Brazilian Firm Exposes Personal Details Of Thousands Of Soccer Fans By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 17:05:32 GMT Full Article headline privacy brazil
and Covert Channel And Data Hiding In TCP/IP By packetstormsecurity.com Published On :: Mon, 04 Nov 2019 02:22:22 GMT Whitepaper called Covert Channel and Data Hiding in TCP/IP. Full Article
and FreeSWITCH Event Socket Command Execution By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 16:05:59 GMT This Metasploit module uses the FreeSWITCH event socket interface to execute system commands using the system API command. The event socket service is enabled by default and listens on TCP port 8021 on the local network interface. This module has been tested successfully on FreeSWITCH versions: 1.6.10-17-726448d~44bit on FreeSWITCH-Deb8-TechPreview virtual machine; 1.8.4~64bit on Ubuntu 19.04 (x64); and 1.10.1~64bit on Windows 7 SP1 (EN) (x64). Full Article
and Shamoon Destroys Data At Italian Oil And Gas Company By packetstormsecurity.com Published On :: Thu, 13 Dec 2018 17:18:51 GMT Full Article headline malware data loss italy scada
and US And Russia Clash Over Power Grid Hack Attacks By packetstormsecurity.com Published On :: Tue, 18 Jun 2019 15:59:50 GMT Full Article headline government usa russia cyberwar scada
and Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices By packetstormsecurity.com Published On :: Mon, 29 Jul 2019 16:35:51 GMT Full Article headline hacker flaw scada
and Phineas Fisher Offers $100,000 Bounty To Hack Banks And Oil Companies By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:02:09 GMT Full Article headline hacker bank cybercrime fraud cyberwar scada
and Design And Implementation Of A Voice Encryption System For Telephone Networks By packetstormsecurity.com Published On :: Mon, 01 Sep 2014 14:02:22 GMT This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish. Full Article
and NagiosXI 5.6 Remote Command Execution By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:30:28 GMT This is a whitepaper tutorial that walks through creating a proof of concept exploit for a remote command execution vulnerability in NagiosXI version 5.6. Full Article
and Symantec Web Gateway 5.0.2.8 Remote Command Execution By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:33:55 GMT This is a whitepaper tutorial that walks through creating a proof of concept exploit for a pre-authentication remote command execution vulnerability in Symantec Web Gateway version 5.0.2.8. Full Article
and NagiosXI 5.6.11 Remote Command Execution By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:36:48 GMT This is a whitepaper tutorial that describes steps taken to identify post-authentication remote command execution vulnerabilities in NagiosXI version 5.6.11. Full Article
and Windows UAC Protection Bypass (Via Slui File Handler Hijack) By packetstormsecurity.com Published On :: Thu, 31 May 2018 20:50:19 GMT This Metasploit module will bypass UAC on Windows 8-10 by hijacking a special key in the Registry under the Current User hive, and inserting a custom command that will get invoked when any binary (.exe) application is launched. But slui.exe is an auto-elevated binary that is vulnerable to file handler hijacking. When we run slui.exe with changed Registry key (HKCU:SoftwareClassesexefileshellopencommand), it will run our custom command as Admin instead of slui.exe. The module modifies the registry in order for this exploit to work. The modification is reverted once the exploitation attempt has finished. The module does not require the architecture of the payload to match the OS. If specifying EXE::Custom your DLL should call ExitProcess() after starting the payload in a different process. Full Article
and Windows 10 UAC Protection Bypass Via Windows Store (WSReset.exe) And Registry By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 23:59:01 GMT This Metasploit module exploits a flaw in the WSReset.exe file associated with the Windows Store. This binary has autoelevate privs, and it will run a binary file contained in a low-privilege registry location. By placing a link to the binary in the registry location, WSReset.exe will launch the binary as a privileged user. Full Article
and Mandriva Linux Security Advisory 2013-271 By packetstormsecurity.com Published On :: Thu, 21 Nov 2013 19:33:57 GMT Mandriva Linux Security Advisory 2013-271 - The make include files in NetBSD before 1.6.2, as used in pmake 1.111 and earlier, allow local users to overwrite arbitrary files via a symlink attack on a /tmp/_depend##### temporary file, related to bsd.lib.mk and bsd.prog.mk. Full Article
and Hacker Leaks 500,000 Credentials For IoT Devices And More By packetstormsecurity.com Published On :: Mon, 20 Jan 2020 17:47:08 GMT Full Article headline hacker denial of service botnet password
and California Man Arrested For DDoS'ing Candidate's Website By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:50:30 GMT Full Article headline government usa denial of service
and MicroStrategy Intelligence Server And Web 10.4 XSS / Disclosure / SSRF / Code Execution By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:50:46 GMT MicroStrategy Intelligence Server and Web version 10.4 suffers from remote code execution, cross site scripting, server-side request forgery, and information disclosure vulnerabilities. Full Article
and Cisco Data Center Network Manager 11.2.1 Command Injection By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:51:21 GMT Cisco Data Center Network Manager version 11.2.1 remote command injection exploit. Full Article
and Irix LPD tagprinter Command Execution By packetstormsecurity.com Published On :: Tue, 27 Oct 2009 16:00:56 GMT This Metasploit module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Irix. Full Article
and COVID-19 Malware Wipes Your PC And Rewrites Your MBR By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 13:49:35 GMT Full Article headline malware virus denial of service
and Kernel Vulns In Android Devices Using Qualcomm Chips Explored By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:30:42 GMT Full Article headline hacker malware phone flaw google
and TBA_Handbook.doc By packetstormsecurity.com Published On :: Mon, 27 Mar 2000 21:04:00 GMT Documentation for TBA, the first wardialer for the PalmOS platform. In Microsoft Word format. Full Article
and Android Banking Trojan Malware Disguises Itself As Super Mario Run By packetstormsecurity.com Published On :: Mon, 09 Jan 2017 14:58:50 GMT Full Article headline malware bank phone trojan cybercrime fraud google
and Android Trojan Has Miner So Aggressive It Can Bork Your Battery By packetstormsecurity.com Published On :: Tue, 19 Dec 2017 14:22:11 GMT Full Article headline malware phone trojan flaw google
and Trojan Malware Campaign Expands With Attacks Against New Banks By packetstormsecurity.com Published On :: Thu, 23 Aug 2018 15:37:24 GMT Full Article headline malware bank trojan cybercrime fraud
and TA505 Is Distributing A Brand New Form Of Malware By packetstormsecurity.com Published On :: Thu, 10 Jan 2019 13:54:13 GMT Full Article headline malware bank trojan cybercrime fraud cyberwar
and Bull / IBM AIX Clusterwatch / Watchware File Write / Command Injection By packetstormsecurity.com Published On :: Tue, 07 Mar 2017 09:32:22 GMT Bull / IBM AIX Clusterwatch / Watchware suffers from having trivial admin credentials, system file writes, and OS command injection vulnerabilities. Full Article
and Thousands Of Hacked Disney+ Accounts Are Already For Sale By packetstormsecurity.com Published On :: Sat, 16 Nov 2019 15:34:58 GMT Full Article headline cybercrime fraud phish
and Black Friday Shoppers Targeted By Scams And Fake Domains By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 16:03:13 GMT Full Article headline cybercrime fraud scam phish
and Coronavirus-Themed Phishing Attacks And Hacking Campaigns Are On The Rise By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:45:57 GMT Full Article headline hacker government virus fraud phish