ces Flaws In WhatsApp's Desktop App Allowed Remote Access To Files By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 17:05:28 GMT Full Article headline privacy data loss flaw facebook
ces BlackBerry GIves Indian Spooks BBM And BIS Access By packetstormsecurity.com Published On :: Thu, 11 Jul 2013 14:51:15 GMT Full Article headline government privacy india blackberry
ces Google Faces New Legal Action For Violating COPPA By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 15:36:04 GMT Full Article headline government privacy google
ces SuiteCRM 7.11.11 Broken Access Control / Local File Inclusion By packetstormsecurity.com Published On :: Thu, 13 Feb 2020 15:49:06 GMT SuiteCRM versions 7.11.11 and below suffer from an add_to_prospect_list broken access control that allows for local file inclusion attacks. Full Article
ces ResourceSpace 6.4.5976 XSS / SQL Injection / Insecure Cookie Handling By packetstormsecurity.com Published On :: Thu, 11 Dec 2014 22:27:12 GMT ResourceSpace suffers from cross site scripting, html injection, insecure cookie handling, and remote SQL injection vulnerabilities. Versions 6.4.5976 and below are affected. Full Article
ces Malware Boom Forces Security Vendors To Roll Out Upgrades Every 40 Minutes By packetstormsecurity.com Published On :: Tue, 08 Apr 2014 15:31:05 GMT Full Article headline malware virus cybercrime fraud symantec
ces Cisco Zero-Day Exploited In The Wild To Crash And Reload Devices By packetstormsecurity.com Published On :: Thu, 01 Nov 2018 14:06:26 GMT Full Article headline hacker denial of service flaw cisco
ces Cisco Elastic Services Controller Allows Takeover By packetstormsecurity.com Published On :: Wed, 08 May 2019 13:07:21 GMT Full Article headline flaw patch cisco
ces MS Catches Russian State Hackers Using IoT Devices For Breaches By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:43:05 GMT Full Article headline hacker microsoft russia cyberwar spyware terror
ces QRadar Community Edition 7.3.1.6 CSRF / Weak Access Control By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 19:57:06 GMT QRadar Community Edition version 7.3.1.6 suffers from cross site request forgery and weak access control vulnerabilities. Full Article
ces Bills Seeks To Reform NSA Surveillance, Aiming At Section 215, FISA Process By packetstormsecurity.com Published On :: Mon, 27 Jan 2020 22:45:13 GMT Full Article headline government privacy usa phone spyware nsa
ces State Department Passport Snoop Faces Little Or No Jail Time By packetstormsecurity.com Published On :: Wed, 14 Jan 2009 20:24:13 GMT Full Article passport
ces File Explorer 1.4 Access Bypass By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:26:58 GMT File Explorer for iOS version 1.4 suffers from an access bypass vulnerability. Full Article
ces Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices By packetstormsecurity.com Published On :: Mon, 29 Jul 2019 16:35:51 GMT Full Article headline hacker flaw scada
ces Juniper Secure Access Cross Site Scripting By packetstormsecurity.com Published On :: Sat, 06 Mar 2010 15:42:52 GMT Juniper Secure Access suffers from a cross site scripting vulnerability. SA Appliances running Juniper IVE OS 6.0 or higher are affected. Full Article
ces Juniper Secure Access Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 23 Jul 2013 14:44:44 GMT Juniper Secure Access software suffers from a reflective cross site scripting vulnerability. Full Article
ces Juniper Secure Access SSL VPN Privilege Escalation By packetstormsecurity.com Published On :: Sat, 22 Dec 2018 18:07:08 GMT Certain Secure Access SA Series SSL VPN products (originally developed by Juniper Networks but now sold and supported by Pulse Secure, LLC) allow privilege escalation, as demonstrated by Secure Access SSL VPN SA-4000 5.1R5 (build 9627) 4.2 Release (build 7631). This occurs because appropriate controls are not performed. Full Article
ces Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access By packetstormsecurity.com Published On :: Tue, 26 Nov 2013 01:52:43 GMT This Metasploit module exploits a vulnerability on Microsoft Silverlight. The vulnerability exists on the Initialize() method from System.Windows.Browser.ScriptObject, which access memory in an unsafe manner. Since it is accessible for untrusted code (user controlled) it's possible to dereference arbitrary memory which easily leverages to arbitrary code execution. In order to bypass DEP/ASLR a second vulnerability is used, in the public WriteableBitmap class from System.Windows.dll. This Metasploit module has been tested successfully on IE6 - IE10, Windows XP SP3 / Windows 7 SP1 on both x32 and x64 architectures. Full Article
ces VMware Host VMX Process COM Class Hijack Privilege Escalation By packetstormsecurity.com Published On :: Mon, 25 Mar 2019 16:02:25 GMT The VMX process (vmware-vmx.exe) process configures and hosts an instance of VM. As is common with desktop virtualization platforms the VM host usually has privileged access into the OS such as mapping physical memory which represents a security risk. To mitigate this the VMX process is created with an elevated integrity level by the authentication daemon (vmware-authd.exe) which runs at SYSTEM. This prevents a non-administrator user opening the process and abusing its elevated access. Unfortunately the process is created as the desktop user which results in the elevated process sharing resources such as COM registrations with the normal user who can modify the registry to force an arbitrary DLL to be loaded into the VMX process. Affects VMware Workstation Windows version 14.1.5 (on Windows 10). Also tested on VMware Player version 15. Full Article
ces Poor Protocol Design For IoT Devices Fueling DDoS By packetstormsecurity.com Published On :: Wed, 18 Sep 2019 16:39:00 GMT Full Article headline denial of service flaw
ces Hacker Leaks 500,000 Credentials For IoT Devices And More By packetstormsecurity.com Published On :: Mon, 20 Jan 2020 17:47:08 GMT Full Article headline hacker denial of service botnet password
ces Ubisoft Sues Operators Of Four DDoS For Hire Services By packetstormsecurity.com Published On :: Tue, 21 Jan 2020 16:44:56 GMT Full Article headline denial of service
ces LastPass Stores Passwords So Securely Users Cannot Access Them By packetstormsecurity.com Published On :: Tue, 21 Jan 2020 16:45:09 GMT Full Article headline denial of service password
ces Kernel Vulns In Android Devices Using Qualcomm Chips Explored By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:30:42 GMT Full Article headline hacker malware phone flaw google
ces Retefe Banking Trojan Resurfaces, Says Goodbye To Tor By packetstormsecurity.com Published On :: Fri, 03 May 2019 22:59:33 GMT Full Article headline malware bank trojan cybercrime fraud
ces CA Common Services casrvc Privilege Escalation By packetstormsecurity.com Published On :: Sat, 28 Jan 2017 15:22:22 GMT CA Technologies support is alerting customers about a medium risk vulnerability that may allow a local attacker to gain additional privileges with products using CA Common Services running on the AIX, HP-UX, Linux, and Solaris platforms. The vulnerability, CVE-2016-9795, occurs due to insufficient validation by the casrvc program. A local unprivileged user can exploit the vulnerability to modify arbitrary files, which can potentially allow a local attacker to gain root level access. Full Article
ces US Says It Can Prove Huawei Has Backdoor Access To Mobile Phone Networks By packetstormsecurity.com Published On :: Wed, 12 Feb 2020 18:13:47 GMT Full Article headline government usa phone china cyberwar backdoor
ces SIM Swappers Are Phishing Telco Employees To Get Access By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 15:36:10 GMT Full Article headline privacy phone cybercrime fraud phish
ces Pwn2Own Tokyo 2019 Victimize Sony, Samsung, And Amazon Devices By packetstormsecurity.com Published On :: Mon, 11 Nov 2019 15:12:06 GMT Full Article headline hacker amazon flaw sony conference japan samsung
ces Search Engine For Japanese Sex Hotels Announces Security Breach By packetstormsecurity.com Published On :: Mon, 06 Jan 2020 16:01:25 GMT Full Article headline privacy data loss japan
ces Google Chrome To Block Heavy Ads That Use Too Many Resources By packetstormsecurity.com Published On :: Thu, 04 Jul 2019 14:06:10 GMT Full Article headline google chrome
ces China Blocks Google Services To Silence Tiananmen Critics By packetstormsecurity.com Published On :: Mon, 02 Jun 2014 13:33:58 GMT Full Article headline government china google censorship
ces China To Crack Down On Censor-Busting Services By packetstormsecurity.com Published On :: Mon, 23 Jan 2017 16:16:08 GMT Full Article headline government china censorship
ces Microsoft's Bing Search Engine Inaccessible In China By packetstormsecurity.com Published On :: Thu, 24 Jan 2019 15:33:05 GMT Full Article headline government microsoft china censorship
ces Russia Successfully Tests Its Unplugged Internet By packetstormsecurity.com Published On :: Tue, 24 Dec 2019 16:08:29 GMT Full Article headline government russia censorship
ces Twitter Demands AI Company Stops Collecting Faces By packetstormsecurity.com Published On :: Thu, 23 Jan 2020 16:22:21 GMT Full Article headline privacy spyware twitter
ces Social Media Giants Warn Of AI Moderation Errors As Coronavirus Empties Offices By packetstormsecurity.com Published On :: Tue, 17 Mar 2020 13:06:52 GMT Full Article headline virus google facebook twitter
ces NtUserCheckAccessForIntegrityLevel Use-After-Free Vulnerability By packetstormsecurity.com Published On :: Fri, 02 Jul 2010 01:05:02 GMT Microsoft Windows Vista / Server 2008 suffer from a NtUserCheckAccessForIntegrityLevel use-after-free vulnerability. Full Article
ces Google Android RCE Bug Allows Attacker Full Device Access By packetstormsecurity.com Published On :: Tue, 05 May 2020 16:03:04 GMT Full Article headline privacy phone data loss flaw google
ces Hacker Gains Access To Some Private Microsoft GitHub Repos By packetstormsecurity.com Published On :: Fri, 08 May 2020 14:23:12 GMT Full Article headline hacker microsoft data loss
ces Turkish Hacker Defaces Kiwi Parliament Website By packetstormsecurity.com Published On :: Mon, 20 Sep 2010 01:09:00 GMT Full Article hacker government turkey
ces Turkey Blocks Access To Tor Anonymizing Network By packetstormsecurity.com Published On :: Mon, 19 Dec 2016 18:58:37 GMT Full Article headline government privacy turkey cryptography
ces Brain Hack Devices Must Be Scrutinized, Say Top Scientists By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:41:11 GMT Full Article headline hacker science
ces Hacking Brain-Computer Interfaces By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 16:25:13 GMT Full Article headline hacker science
ces FreeBSD Bug Grants Local Root Access By packetstormsecurity.com Published On :: Mon, 14 Sep 2009 02:07:55 GMT Full Article bsd
ces FreeBSD Bug Gives Untrusted Root Access By packetstormsecurity.com Published On :: Tue, 01 Dec 2009 21:02:11 GMT Full Article bsd
ces Travelex Suspends Services Post Malware Discovery By packetstormsecurity.com Published On :: Fri, 03 Jan 2020 19:15:15 GMT Full Article headline malware britain
ces Hacking iOS Devices By packetstormsecurity.com Published On :: Wed, 07 Dec 2011 16:09:44 GMT Whitepaper called Hacking Dispositivos iOS. It demonstrates how dangerous it is to be connected to a wireless network with an iOS device that has OpenSSH enabled. Written in Spanish. Full Article
ces What makes a successful free zone? By www.fdiintelligence.com Published On :: Thu, 17 Oct 2019 11:00:38 +0000 Dr Samir Hamrouni, CEO of the World Free Zones Organization, outlines the attributes that are essential to flourishing free zones. Full Article
ces Synaccess netBooter NP-02x / NP-08x 6.8 Authentication Bypass By packetstormsecurity.com Published On :: Mon, 19 Nov 2018 19:09:21 GMT Synaccess netBooter NP-02x and NP-08x version 6.8 suffer from an authentication bypass vulnerability due to a missing control check when calling the webNewAcct.cgi script while creating users. This allows an unauthenticated attacker to create an admin user account and bypass authentication giving her the power to turn off a power supply to a resource. Full Article