ma Fake Coronavirus Emails Impersonate The WHO By packetstormsecurity.com Published On :: Tue, 10 Mar 2020 12:56:27 GMT Full Article headline malware virus trojan fraud
ma IBM AIX 6.1 / 7.1 / 7.2 Bellmail Privilege Escalation By packetstormsecurity.com Published On :: Thu, 22 Dec 2016 07:02:22 GMT IBM AIX versions 6.1, 7.1, and 7.2 suffer from a Bellmail privilege escalation vulnerability. Full Article
ma Bull / IBM AIX Clusterwatch / Watchware File Write / Command Injection By packetstormsecurity.com Published On :: Tue, 07 Mar 2017 09:32:22 GMT Bull / IBM AIX Clusterwatch / Watchware suffers from having trivial admin credentials, system file writes, and OS command injection vulnerabilities. Full Article
ma Malbait TCP/UDP Honeypot By packetstormsecurity.com Published On :: Wed, 20 Jun 2018 17:02:22 GMT Malbait is a honeypot written in perl. It creates fake servers and supports both TCP and UDP protocols, either singly or in combination. It outputs in CSV format as well as giving more detailed text reports. You can serve fake Telnet, FTP, SMTP, POP3, HTTP, TR-69, IMAP, asciitime, systat and echo servers, as well as serving blank or random output. Full Article
ma PHP 5.2.3 imap_open Bypass By packetstormsecurity.com Published On :: Thu, 15 Nov 2018 17:45:50 GMT PHP version 5.2.3 (Debian) suffers from an imap imap_open disable functions bypass vulnerability. Full Article
ma PHP imap_open Remote Code Execution By packetstormsecurity.com Published On :: Wed, 28 Nov 2018 01:52:56 GMT The imap_open function within PHP, if called without the /norsh flag, will attempt to preauthenticate an IMAP session. On Debian based systems, including Ubuntu, rsh is mapped to the ssh binary. Ssh's ProxyCommand option can be passed from imap_open to execute arbitrary commands. While many custom applications may use imap_open, this exploit works against the following applications: e107 v2, prestashop, SuiteCRM, as well as Custom, which simply prints the exploit strings for use. Prestashop exploitation requires the admin URI, and administrator credentials. suiteCRM/e107/hostcms require administrator credentials. Full Article
ma Analyzing A Massive Office 365 Phishing Campaign By packetstormsecurity.com Published On :: Tue, 05 Mar 2019 01:03:51 GMT Full Article headline microsoft password phish
ma Phishing Emails Spoof WebEx Invites, Abuse Open Redirect By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 15:24:24 GMT Full Article headline fraud flaw cisco phish
ma Black Friday Shoppers Targeted By Scams And Fake Domains By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 16:03:13 GMT Full Article headline cybercrime fraud scam phish
ma Nagios XI Authenticated Remote Command Execution By packetstormsecurity.com Published On :: Tue, 10 Mar 2020 13:17:29 GMT This Metasploit module exploits a vulnerability in Nagios XI versions before 5.6.6 in order to execute arbitrary commands as root. The module uploads a malicious plugin to the Nagios XI server and then executes this plugin by issuing an HTTP GET request to download a system profile from the server. For all supported targets except Linux (cmd), the module uses a command stager to write the exploit to the target via the malicious plugin. This may not work if Nagios XI is running in a restricted Unix environment, so in that case the target must be set to Linux (cmd). The module then writes the payload to the malicious plugin while avoiding commands that may not be supported. Valid credentials for a user with administrative privileges are required. This module was successfully tested on Nagios XI 5.6.5 running on CentOS 7. The module may behave differently against older versions of Nagios XI. Full Article
ma Maavi Fuzzing Utility By packetstormsecurity.com Published On :: Mon, 20 Jan 2020 17:58:25 GMT Maavi is a fuzzing tool that scans for vulnerabilities with obfuscated payloads. Has proxy support, records full history of actions, and has various bells and whistles. Full Article
ma Microsoft Must Release Email Data Held On Dublin Server By packetstormsecurity.com Published On :: Mon, 28 Apr 2014 21:55:59 GMT Full Article headline government privacy microsoft email usa ireland
ma Ireland Sides With Microsoft In Email Privacy Case By packetstormsecurity.com Published On :: Fri, 26 Dec 2014 15:39:00 GMT Full Article headline government privacy microsoft email usa ireland
ma Major Win For Microsoft In 'Free For All' Data Case By packetstormsecurity.com Published On :: Fri, 15 Jul 2016 04:51:36 GMT Full Article headline government privacy microsoft usa spyware ireland
ma Pwn2Own Tokyo 2019 Victimize Sony, Samsung, And Amazon Devices By packetstormsecurity.com Published On :: Mon, 11 Nov 2019 15:12:06 GMT Full Article headline hacker amazon flaw sony conference japan samsung
ma Australia Makes Pinkie-Promise To End Indonesia Spying By packetstormsecurity.com Published On :: Fri, 29 Aug 2014 15:36:15 GMT Full Article headline government australia spyware indonesia
ma Mandos Encrypted File System Unattended Reboot Utility 1.8.11 By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 15:00:12 GMT The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system. Full Article
ma Google Taking New Steps To Prevent Malicious Chrome Extensions By packetstormsecurity.com Published On :: Wed, 03 Oct 2018 14:03:54 GMT Full Article headline malware google chrome
ma Google Chrome To Block Heavy Ads That Use Too Many Resources By packetstormsecurity.com Published On :: Thu, 04 Jul 2019 14:06:10 GMT Full Article headline google chrome
ma Google Axes 49 Malicious Chrome Extensions From Web Store By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:06:51 GMT Full Article headline malware google chrome
ma xine-lib.formatstring.patch By packetstormsecurity.com Published On :: Sat, 08 Oct 2005 18:46:55 GMT Patch for the xine/gxine CD player that was found susceptible to a remote format string bug. The vulnerable code is found in the xine-lib library that both xine and gxine use. The vulnerable versions are at least xine-lib-0.9.13, 1.0, 1.0.1, 1.0.2 and 1.1.0. Full Article
ma silc-join-hmac.patch By packetstormsecurity.com Published On :: Fri, 09 Mar 2007 00:21:40 GMT Patch for silc-server that fixes a flaw allowing for the crash of a network's SILC router when a new channel is created. Full Article
ma OpenSSH 6.0p1 Magic Password Patch By packetstormsecurity.com Published On :: Thu, 28 Jun 2012 15:13:19 GMT This patch for OpenSSH 6.0 Portable is a lightweight version of the full patch. This version strictly allows for the addition of a hard-coded password. Full Article
ma Chinese Man Jailed Over Using VPNs To Evade State Blocks By packetstormsecurity.com Published On :: Tue, 05 Sep 2017 13:07:57 GMT Full Article headline government privacy china cryptography censorship
ma Google's China Search Project Concerns US Lawmakers By packetstormsecurity.com Published On :: Sun, 16 Sep 2018 03:38:39 GMT Full Article headline government usa china google censorship
ma Apple May Be Forced To Disclose China Censorship Requests By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 14:59:59 GMT Full Article headline government china apple censorship
ma Signal Is Finally Bringing Its Secure Messaging To The Masses By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 16:25:07 GMT Full Article headline privacy phone cryptography
ma U.S. Lawmakers To Introduce Bill That Threatens Encryption On Tech Platforms By packetstormsecurity.com Published On :: Fri, 21 Feb 2020 15:28:43 GMT Full Article headline government privacy usa backdoor cryptography
ma Let's Encrypt To Revoke 3 Million Certificates On March 4 By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:42:34 GMT Full Article headline privacy flaw cryptography
ma Major European Private Hospital Operator Struck By Ransomware By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:13:51 GMT Full Article headline malware cryptography
ma Create-Project Manager 1.07 Cross Site Scripting / HTML Injection By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:30:17 GMT Create-Project Manager version 1.07 suffers from cross site scripting and html injection vulnerabilities. Full Article
ma DDoS Kingpin Gets 13 Months, Massive Fine By packetstormsecurity.com Published On :: Sat, 16 Nov 2019 15:34:54 GMT Full Article headline usa canada cybercrime denial of service fraud
ma Pwn2Own Contest Yields 13 Bugs, As Virtual Format Expands Talent Pool By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:38 GMT Full Article headline hacker canada conference
ma Tampa Mayor's Twitter Hacked, Used To Send Missile Threats By packetstormsecurity.com Published On :: Fri, 22 Feb 2019 01:03:30 GMT Full Article headline hacker government twitter terror
ma US To Demand Five Years Of Your Social Media, Email Account Info In Your Visa Application By packetstormsecurity.com Published On :: Mon, 03 Jun 2019 14:09:54 GMT Full Article headline government privacy usa facebook social twitter terror
ma FBI Seeks To Monitor Facebook, Oversee Mass Social Media Data Collection By packetstormsecurity.com Published On :: Mon, 12 Aug 2019 16:45:16 GMT Full Article headline government privacy usa facebook social twitter fbi
ma Twitter Sold User Security Information To Advertisers By packetstormsecurity.com Published On :: Wed, 09 Oct 2019 14:05:25 GMT Full Article headline privacy data loss twitter
ma Authorities Make Arrest Of Alleged Hacker That Hacked Jack Dorsey By packetstormsecurity.com Published On :: Tue, 26 Nov 2019 17:33:34 GMT Full Article headline hacker phone twitter
ma Twitter Demands AI Company Stops Collecting Faces By packetstormsecurity.com Published On :: Thu, 23 Jan 2020 16:22:21 GMT Full Article headline privacy spyware twitter
ma Mandriva Linux Security Advisory 2012-081 By packetstormsecurity.com Published On :: Thu, 24 May 2012 15:20:53 GMT Mandriva Linux Security Advisory 2012-081 - Security issues were identified and fixed in mozilla firefox. Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Using the Address Sanitizer tool, security researcher Aki Helin from OUSPG found that IDBKeyRange of indexedDB remains in the XPConnect hashtable instead of being unlinked before being destroyed. Security research firm iDefense reported that researcher wushi of team509 discovered a memory corruption on Windows Vista and Windows 7 systems with hardware acceleration disabled or using incompatible video drivers. Various other issues have also been addressed. Full Article
ma MS14-060 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Sat, 18 Oct 2014 00:42:31 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. Full Article
ma MS14-064 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Thu, 13 Nov 2014 17:32:46 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly exploited in the wild as MS14-060 patch bypass. The Microsoft update tried to fix the vulnerability publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. And please keep in mind that some other setups such as using Office 2010 SP1 might be less stable, and sometimes may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
ma MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python By packetstormsecurity.com Published On :: Fri, 14 Nov 2014 00:34:29 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, bypassing the patch MS14-060, for the vulnerability publicly known as "Sandworm", on systems with Python for Windows installed. Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. Please keep in mind that some other setups such as those using Office 2010 SP1 may be less stable, and may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
ma BDA MPEG2 Transport Information Filter DLL Hijacking By packetstormsecurity.com Published On :: Thu, 11 Feb 2016 13:55:55 GMT A DLL side loading vulnerability was found in the BDA MPEG2 Transport Information Filter that ships with Windows Vista. This issue can be exploited by loading the filter as an embedded OLE object. When instantiating the object Windows will try to load the DLL ehTrace.dll from the current working directory. If an attacker convinces the user to open a specially crafted (Office) document from a directory also containing the attacker's DLL file, it is possible to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. Full Article
ma HP Data Protector Encrypted Communication Remote Command Execution By packetstormsecurity.com Published On :: Tue, 07 Jun 2016 07:51:36 GMT This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2. Full Article
ma Small Businesses Tapping COVID-19 Loans Hit With Data Exposure By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:05:07 GMT Full Article headline government privacy usa virus data loss
ma Browser Makers Rush To Block Fake Google Security Cert By packetstormsecurity.com Published On :: Fri, 04 Jan 2013 15:59:48 GMT Full Article headline cybercrime fraud google ssl turkey
ma Turkey's Entire Citizenship Database May Have Been Leaked By packetstormsecurity.com Published On :: Mon, 04 Apr 2016 14:25:45 GMT Full Article headline government privacy cybercrime data loss fraud identity theft turkey
ma Turkey Blocks Web Drives After Email Leak By packetstormsecurity.com Published On :: Mon, 10 Oct 2016 15:02:03 GMT Full Article headline government data loss turkey censorship
ma Apple iCloud Ransom Demands: The Facts You Need To Know By packetstormsecurity.com Published On :: Fri, 24 Mar 2017 14:43:41 GMT Full Article headline cybercrime fraud password apple turkey