la LastPass Stores Passwords So Securely Users Cannot Access Them By packetstormsecurity.com Published On :: Tue, 21 Jan 2020 16:45:09 GMT Full Article headline denial of service password
la 16 DDoS Attacks Take Place Every 60 Seconds, Rates Reach 622 Gbps By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 14:59:42 GMT Full Article headline hacker cybercrime denial of service fraud
la AVideo Platform 8.1 User Enumeration By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:35:58 GMT AVideo Platform version 8.1 suffers from an information disclosure vulnerability that allows for user enumeration. Full Article
la LabVantage 8.3 Information Disclosure By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 17:27:30 GMT LabVantage version 8.3 suffers from an information disclosure vulnerability. Full Article
la Cisco Unified Contact Center Express Privilege Escalation By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:26:11 GMT Cisco Unified Contact Center Express suffers from a privilege escalation vulnerability. Full Article
la Cisco AnyConnect Secure Mobility Client 4.8.01090 Privilege Escalation By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:36:17 GMT Cisco AnyConnect Secure Mobility Client for Windows version 4.8.01090 suffer from a privilege escalation vulnerability due to insecure handling of path names. Full Article
la Apple Disputes Recent iOS Zero Day Claim By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:32:14 GMT Full Article headline hacker phone flaw apple zero day
la Attackers Exploit 0-Day Code Execution Flaw In The Sophos Firewall By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:39:49 GMT Full Article headline hacker flaw
la GitLab Awards Researcher $20,000 For Remote Code Execution Bug By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:28:19 GMT Full Article headline hacker flaw patch
la Europol Arrests Hackers Behind Infinity Black Hacker Group By packetstormsecurity.com Published On :: Tue, 05 May 2020 16:02:56 GMT Full Article headline hacker government cybercrime
la Apple's Corellium Lawsuit Causes Chilling Effect With Security Researchers By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:30:58 GMT Full Article headline hacker phone apple
la Amiga Launches A $2,500 Quad-Core Lunchbox PC By packetstormsecurity.com Published On :: Fri, 23 Mar 2012 06:34:35 GMT Full Article headline commodore
la GPlayed Trojan's Baby Brother Is After Your Bank Account By packetstormsecurity.com Published On :: Tue, 30 Oct 2018 15:43:10 GMT Full Article headline malware bank trojan cybercrime fraud
la Pied Piper Phishing Scheme Infests Victims With FlawedAmmyy, RMS RATs By packetstormsecurity.com Published On :: Sat, 01 Dec 2018 13:04:15 GMT Full Article headline malware trojan fraud backdoor
la Lazarus Group Visits The Apple Orchard With New macOS Trojan By packetstormsecurity.com Published On :: Thu, 05 Dec 2019 16:54:04 GMT Full Article headline malware trojan apple backdoor
la IBM AIX HACMP Privlege Escalation By packetstormsecurity.com Published On :: Tue, 08 Sep 2015 23:33:33 GMT IBM AIX High Availability Cluster Multiprocessing (HACMP) suffers from a local privilege escalation vulnerability that results in root privileges. Full Article
la IBM AIX 6.1 / 7.1 / 7.2 Bellmail Privilege Escalation By packetstormsecurity.com Published On :: Thu, 22 Dec 2016 07:02:22 GMT IBM AIX versions 6.1, 7.1, and 7.2 suffer from a Bellmail privilege escalation vulnerability. Full Article
la CA Common Services casrvc Privilege Escalation By packetstormsecurity.com Published On :: Sat, 28 Jan 2017 15:22:22 GMT CA Technologies support is alerting customers about a medium risk vulnerability that may allow a local attacker to gain additional privileges with products using CA Common Services running on the AIX, HP-UX, Linux, and Solaris platforms. The vulnerability, CVE-2016-9795, occurs due to insufficient validation by the casrvc program. A local unprivileged user can exploit the vulnerability to modify arbitrary files, which can potentially allow a local attacker to gain root level access. Full Article
la Xorg X11 Server (AIX) Local Privilege Escalation By packetstormsecurity.com Published On :: Wed, 05 Dec 2018 05:22:22 GMT Xorg X11 server on AIX local privilege escalation exploit. Full Article
la Xorg X11 Server Local Privilege Escalation By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 19:01:06 GMT This Metasploit module has been tested with AIX 7.1 and 7.2, and should also work with 6.1. Due to permission restrictions of the crontab in AIX, this module does not use cron, and instead overwrites /etc/passwd in order to create a new user with root privileges. All currently logged in users need to be included when /etc/passwd is overwritten, else AIX will throw 'Cannot get "LOGNAME" variable' when attempting to change user. The Xorg '-fp' parameter used in the OpenBSD exploit does not work on AIX, and is replaced by '-config', in conjuction with ANSI-C quotes to inject newlines when overwriting /etc/passwd. Full Article
la Black Friday Shoppers Targeted By Scams And Fake Domains By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 16:03:13 GMT Full Article headline cybercrime fraud scam phish
la Northern Ireland DFP Rapped Over Data Loss By packetstormsecurity.com Published On :: Tue, 22 Dec 2009 02:55:40 GMT Full Article data loss ireland
la Ireland Passes SOPA-Like Anti-Piracy Legislation Despite Protests By packetstormsecurity.com Published On :: Thu, 01 Mar 2012 16:22:30 GMT Full Article headline government riaa mpaa pirate ireland
la Ireland Sides With Microsoft In Email Privacy Case By packetstormsecurity.com Published On :: Fri, 26 Dec 2014 15:39:00 GMT Full Article headline government privacy microsoft email usa ireland
la DDoS Attack Disrupts Ireland's National Lottery By packetstormsecurity.com Published On :: Thu, 21 Jan 2016 14:42:09 GMT Full Article headline denial of service ireland
la US Government To Defend Surveillance Activities In Irish Courts By packetstormsecurity.com Published On :: Mon, 13 Jun 2016 15:11:00 GMT Full Article headline government privacy usa facebook ireland
la Cyber Jihad Between Indonesia And Bangladesh By packetstormsecurity.com Published On :: Wed, 31 Jul 2013 04:59:45 GMT Full Article headline cyberwar terror indonesia
la Google Splats 21 Bugs In Chrome 54 Patch Run By packetstormsecurity.com Published On :: Fri, 14 Oct 2016 15:36:02 GMT Full Article headline flaw google patch chrome
la Google Fixes 12 High-Severity Flaws In Chrome Browser By packetstormsecurity.com Published On :: Sat, 03 Dec 2016 15:20:36 GMT Full Article headline flaw google patch chrome
la Chrome To Label FTP Sites Insecure By packetstormsecurity.com Published On :: Fri, 15 Sep 2017 14:44:47 GMT Full Article headline google chrome
la Google Steps Up Browser Rivalry With Site Isolation Security By packetstormsecurity.com Published On :: Thu, 07 Dec 2017 14:24:14 GMT Full Article headline google chrome
la Evernote Critical Flaw Opened Personal Data Of Millions To Attack By packetstormsecurity.com Published On :: Fri, 14 Jun 2019 16:08:21 GMT Full Article headline privacy flaw chrome
la Google Squashes High Severity Flaws In Chrome Browser By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:16 GMT Full Article headline flaw google patch chrome
la Launcher Execution Mitigation Patch By packetstormsecurity.com Published On :: Fri, 10 Jan 2020 02:33:33 GMT This patch mitigates allowing launcher the ability to execute arbitrary programs. Full Article
la Zuckerberg: Facebook Investigating Censorship Claim By packetstormsecurity.com Published On :: Fri, 13 May 2016 13:45:40 GMT Full Article headline government facebook censorship
la Google's China Search Project Concerns US Lawmakers By packetstormsecurity.com Published On :: Sun, 16 Sep 2018 03:38:39 GMT Full Article headline government usa china google censorship
la Protests In Russia Target Internet Iron Curtain Legislation By packetstormsecurity.com Published On :: Mon, 11 Mar 2019 14:35:35 GMT Full Article headline government russia cyberwar censorship
la Vladimir Putin Signs Sweeping Internet Censorship Bills By packetstormsecurity.com Published On :: Tue, 19 Mar 2019 14:17:50 GMT Full Article headline government russia censorship
la Hong Kong ISPs Oppose Any Government Plans To Restrict Internet By packetstormsecurity.com Published On :: Thu, 29 Aug 2019 15:57:24 GMT Full Article headline government privacy china censorship
la Microsoft's GitHub Blocks Catalan Protest App By packetstormsecurity.com Published On :: Wed, 30 Oct 2019 15:36:48 GMT Full Article headline government microsoft spain censorship
la U.S. Lawmakers To Introduce Bill That Threatens Encryption On Tech Platforms By packetstormsecurity.com Published On :: Fri, 21 Feb 2020 15:28:43 GMT Full Article headline government privacy usa backdoor cryptography
la SolarWinds MSP PME Cache Service Insecure File Permissions / Code Execution By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:17:54 GMT SolarWinds MSP PME Cache Service versions prior to 1.1.15 suffer from insecure file permission and code execution vulnerabilities. Full Article
la LANCOM WLAN Controller Cross Site Scripting By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:34:10 GMT LANCOM WLAN Controller suffers from multiple cross site scripting vulnerabilities. Multiple versions and firmware are affected. Full Article
la Russia Opens Case Against Facebook, Twitter Over Data Laws By packetstormsecurity.com Published On :: Tue, 22 Jan 2019 14:26:52 GMT Full Article headline government privacy russia spyware facebook twitter
la DVD X Player 5.5 .plf PlayList Buffer Overflow By packetstormsecurity.com Published On :: Fri, 02 Sep 2011 15:22:44 GMT This Metasploit module exploits a stack-based buffer overflow on DVD X Player 5.5 Pro and Standard. By supplying a long string of data in a plf file (playlist), the MediaPlayerCtrl.dll component will attempt to extract a filename out of the string, and then copy it on the stack without any proper bounds checking, which causes a buffer overflow, and results arbitrary code execution under the context of the user. This Metasploit module has been designed to target common Windows systems such as: Windows XP SP2/SP3, Windows Vista, and Windows 7. Full Article
la ACDSee FotoSlate PLP File id Parameter Overflow By packetstormsecurity.com Published On :: Mon, 10 Oct 2011 22:35:13 GMT This Metasploit module exploits a buffer overflow in ACDSee FotoSlate 4.0 Build 146 via a specially crafted id parameter in a String element. When viewing a malicious PLP file with the ACDSee FotoSlate product, a remote attacker could overflow a buffer and execute arbitrary code. This exploit has been tested on systems such as Windows XP SP3, Windows Vista, and Windows 7. Full Article
la CCMPlayer 1.5 Stack Buffer Overflow By packetstormsecurity.com Published On :: Sat, 03 Dec 2011 18:32:22 GMT This Metasploit module exploits a stack based buffer overflow in CCMPlayer 1.5. Opening a m3u playlist with a long track name, a SEH exception record can be overwritten with parts of the controllable buffer. SEH execution is triggered after an invalid read of an injectable address, thus allowing arbitrary code execution. This Metasploit module works on multiple Windows platforms including: Windows XP SP3, Windows Vista, and Windows 7. Full Article
la MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation By packetstormsecurity.com Published On :: Mon, 29 Jul 2013 22:14:06 GMT The Windows kernel does not properly isolate broadcast messages from low integrity applications from medium or high integrity applications. This allows commands to be broadcasted to an open medium or high integrity command prompts allowing escalation of privileges. We can spawn a medium integrity command prompt, after spawning a low integrity command prompt, by using the Win+Shift+# combination to specify the position of the command prompt on the taskbar. We can then broadcast our command and hope that the user is away and doesn't corrupt it by interacting with the UI. Broadcast issue affects versions Windows Vista, 7, 8, Server 2008, Server 2008 R2, Server 2012, RT. But Spawning a command prompt with the shortcut key does not work in Vista so you will have to check if the user is already running a command prompt and set SPAWN_PROMPT false. The WEB technique will execute a powershell encoded payload from a Web location. The FILE technique will drop an executable to the file system, set it to medium integrity and execute it. The TYPE technique will attempt to execute a powershell encoded payload directly from the command line but it may take some time to complete. Full Article
la Investors Sue LabCorp Over Security Failures In Light Of Data Breach By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:45:46 GMT Full Article headline hacker privacy virus data loss
la Hacker Finds Old Tesla Parts On eBay Full Of User Data By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:31:22 GMT Full Article headline hacker privacy data loss