if Packet Storm Exploit 2013-0917-1 - Oracle Java ShortComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:45:32 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
if Packet Storm Advisory 2013-0917-1 - Oracle Java ShortComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:50:06 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
if California Man Arrested For DDoS'ing Candidate's Website By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:50:30 GMT Full Article headline government usa denial of service
if Swift File Transfer Mobile Cross Site Scripting / Information Disclosure By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 21:27:35 GMT The Swift File Transfer mobile application for ios, blackberry and android suffers from cross site scripting and information disclosure vulnerabilities. Full Article
if Cisco Content Security Virtual Appliance M380 IronPort Remote Cross Site Host Modification By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:12:10 GMT Cisco Content Security Virtual Appliance M380 IronPort remote cross site host modification demo exploit. Full Article
if Cisco Unified Contact Center Express Privilege Escalation By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:26:11 GMT Cisco Unified Contact Center Express suffers from a privilege escalation vulnerability. Full Article
if LibTIFF 4.0.8 Memory Leak By packetstormsecurity.com Published On :: Fri, 21 Dec 2018 18:32:22 GMT LibTIFF version 4.0.8 suffers from multiple memory leak vulnerabilities. Full Article
if Ursnif Banking Trojan Spreading In Japan By packetstormsecurity.com Published On :: Fri, 27 Oct 2017 17:45:54 GMT Full Article headline malware bank trojan cybercrime fraud japan
if Shifty New Variant Of Qbot Banking Trojan Spreads By packetstormsecurity.com Published On :: Fri, 01 Mar 2019 00:17:09 GMT Full Article headline malware bank trojan
if Emotet Trojan Evolves To Spread Via A WiFi Connection By packetstormsecurity.com Published On :: Tue, 11 Feb 2020 15:34:01 GMT Full Article headline malware trojan wireless
if Ansvif 1.5 By packetstormsecurity.com Published On :: Thu, 19 May 2016 11:11:11 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if Ansvif 1.5.1 By packetstormsecurity.com Published On :: Thu, 02 Jun 2016 04:33:33 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if Ansvif 1.5.2 By packetstormsecurity.com Published On :: Tue, 21 Jun 2016 01:07:50 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if Ansvif 1.6 By packetstormsecurity.com Published On :: Sun, 02 Oct 2016 18:22:22 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if Ansvif 1.6.1 By packetstormsecurity.com Published On :: Mon, 21 Nov 2016 17:32:58 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if Ansvif 1.6.2 By packetstormsecurity.com Published On :: Sat, 25 Feb 2017 16:14:25 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if Ansvif 1.7 By packetstormsecurity.com Published On :: Thu, 13 Apr 2017 02:33:30 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if Ansvif 1.8 By packetstormsecurity.com Published On :: Tue, 12 Sep 2017 05:07:12 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if Ansvif 1.8.1 By packetstormsecurity.com Published On :: Thu, 26 Oct 2017 03:01:43 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if Ansvif 1.8.1.1 By packetstormsecurity.com Published On :: Fri, 29 Dec 2017 16:24:13 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if Ansvif 1.9 By packetstormsecurity.com Published On :: Mon, 16 Apr 2018 20:22:22 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if Ansvif 1.9.1 By packetstormsecurity.com Published On :: Thu, 19 Apr 2018 14:12:07 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if Ansvif 1.10 By packetstormsecurity.com Published On :: Mon, 27 Aug 2018 17:54:37 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if Ansvif 1.11a By packetstormsecurity.com Published On :: Tue, 23 Oct 2018 23:34:30 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if Ansvif 1.11 By packetstormsecurity.com Published On :: Thu, 03 Jan 2019 03:00:48 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if Ansvif 1.12 By packetstormsecurity.com Published On :: Wed, 30 Oct 2019 16:06:59 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
if hap-linux-2.2.26-1.diff By packetstormsecurity.com Published On :: Sat, 01 May 2004 16:53:16 GMT HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories if they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff. Full Article
if Let's Encrypt Reaches One Billion Certificates Issued By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 07:05:24 GMT Full Article headline privacy cryptography
if Let's Encrypt To Revoke 3 Million Certificates On March 4 By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:42:34 GMT Full Article headline privacy flaw cryptography
if Fortinet FortiSIEM 5.0 / 5.2.1 Improper Certification Validation By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 20:48:19 GMT A FortiSIEM collector connects to a Supervisor/Worker over HTTPS TLS (443/TCP) to register itself as well as relaying event data such as syslog, netflow, SNMP, etc. When the Collector (the client) connects to the Supervisor/Worker (the server), the client does not validate the server-provided certificate against its root-CA store. Since the client does no server certificate validation, this means any certificate presented to the client will be considered valid and the connection will succeed. If an attacker spoofs a Worker/Supervisor using an ARP or DNS poisoning attack (or any other MITM attack), the Collector will blindly connect to the attacker's HTTPS TLS server. It will disclose the authentication password used along with any data being relayed. Versions 5.0 and 5.2.1 have been tested and are affected. Full Article
if iFileExplorer Free Directory Traversal By packetstormsecurity.com Published On :: Sat, 05 Mar 2011 01:11:28 GMT iFileExplorer Free for iPod Touch / iPhone version 2.8 suffers from a remote directory traversal vulnerability. Full Article
if Metasploit Libnotify Arbitrary Command Execution By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:36:46 GMT This Metasploit module exploits a shell command injection vulnerability in the libnotify plugin. This vulnerability affects Metasploit versions 5.0.79 and earlier. Full Article
if Asia-Pacific Cities of the Future 2019/20 – the winners By www.fdiintelligence.com Published On :: Thu, 15 Aug 2019 11:00:47 +0000 Singapore has retained its place at the top of fDi's Asia-Pacific Cities of the Future ranking, with Shanghai and Tokyo completing the top three list. Full Article
if Russia most diversified commodity economy for the fourth year By www.fdiintelligence.com Published On :: Thu, 15 Aug 2019 11:00:45 +0000 Russia remains fDi’s most diversified commodity economy, while second ranked Brazil has displaced Ukraine into third place. Cathy Mullan reports. Full Article
if DAWIN - Distributed Audit and Wireless Intrustion Notification By packetstormsecurity.com Published On :: Wed, 17 Sep 2014 22:34:16 GMT DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual. Full Article
if WifiPhisher Phishing Tool By packetstormsecurity.com Published On :: Sun, 04 Jan 2015 23:33:33 GMT Wifiphisher is a security tool that mounts fast automated phishing attacks against WPA networks in order to obtain the secret passphrase. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining WPA credentials. Full Article
if DAWIN - Distributed Audit and Wireless Intrustion Notification 2.0 By packetstormsecurity.com Published On :: Tue, 28 Apr 2015 00:52:43 GMT DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual. Full Article
if Sierra Wireless AirLink ES450 ACEManager upload.cgi Unverified Password Change By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 20:32:22 GMT An exploitable unverified password change vulnerability exists in the ACEManager upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause a unverified device configuration change, resulting in an unverified change of the user password on the device. An attacker can make an authenticated HTTP request to trigger this vulnerability. Full Article
if Rifatron Intelligent Digital Security System (animate.cgi) Stream Disclosure By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:46:02 GMT The Rifatron Intelligent Digital Security System DVR suffers from an unauthenticated and unauthorized live stream disclosure when animate.cgi script is called through Mobile Web Viewer module. Full Article
if Best Buy Gift Cards, USB Drive Used To Spread Infostealer By packetstormsecurity.com Published On :: Sat, 28 Mar 2020 15:12:50 GMT Full Article headline malware fraud
if UK Spies Will Need Artificial Intelligence By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:34:14 GMT Full Article headline government britain spyware
if Kuwait pins hopes on diversification with Vision 2035 By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:16 +0000 Kuwait's National Vision 2035 has economic diversification at its heart. This move from hydrocarbon reliance to other sectors is attracting investor attention, as Wendy Atkins reports. Full Article
if SSH Sniffer Attack Poses Minor Risk By packetstormsecurity.com Published On :: Tue, 18 Nov 2008 08:25:29 GMT Full Article ssh
if In quest for bigger batteries, California mulls pumped hydro By feedproxy.google.com Published On :: 2019-06-10T11:15:00Z As the sun sets on California’s solar farms, a backup energy source deep in the Sierra Nevada Mountains springs to life. Full Article News Hydropower Wind Power Grid Scale Storage Solar
if Trump exempts bi-facial solar modules from import tariffs By feedproxy.google.com Published On :: 2019-06-13T15:50:54Z In an announcement that was celebrated by the solar industry, yesterday U.S. trade officials said that bi-facial solar modules, which are solar modules that produce energy on both sides of the panel, would be exempt from import tariffs. Full Article Monitoring News Solar Utility Integration
if California Energy Commission gives $3M grant to pair energy storage and fast EV charging By feedproxy.google.com Published On :: 2019-06-13T21:14:21Z Natron Energy said that the California Energy Commission (CEC) awarded it a $3 million grant for “Advanced Energy Storage for Electric Vehicle Charging Support.” Natron will use the money to manufacture and install a high powered, long cycle life energy storage system at an EV Fast Charging station. Full Article Storage Infrastructure News
if Here's how a bird started a fire at a California solar farm By feedproxy.google.com Published On :: 2019-06-25T13:14:43Z It may be safe for a bird to land on a wire, but not on two of them at once. Full Article Monitoring News Utility Scale C&I Asset Management
if Clean Power Alliance signs PPA for 12-MW Isabella small hydro project in California By feedproxy.google.com Published On :: 2019-07-03T19:00:00Z The Clean Power Alliance (CPA) has signed three long-term power purchase agreements, including two new solar projects and one existing small hydro project. Full Article Small Hydro North America News Hydropower Business Solar
if LIHI certifies two low-impact hydroelectric facilities By feedproxy.google.com Published On :: 2019-07-19T14:39:00Z The Low Impact Hydropower Institute recently announced it had awarded low-impact certification status to two hydroelectric facilities: Full Article Environmental North America News Hydropower Generators and Electrical Components
if NY governor announces $1.1 billion project to extend life of Niagara Power Project By feedproxy.google.com Published On :: 2019-08-02T14:13:00Z Governor Andrew M. Cuomo has announced that the New York Power Authority is launching a 15-year modernization and digitization program to significantly extend the operating life of the Niagara Power Project. Full Article North America News Rehabilitation and Repair Hydropower Canals Tunnels and Penstocks