av DEF CON China Cancelled Due To Coronavirus By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 15:36:00 GMT Full Article headline virus china conference
av Black Hat Asia 2020 Postponed Due To Coronavirus Concerns By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 14:43:21 GMT Full Article headline china conference
av IBM Pulls Out Of RSA Over Coronavirus Fears By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 15:00:54 GMT Full Article headline ibm conference rsa
av Vendors Ditching RSA Over Coronavirus Fears By packetstormsecurity.com Published On :: Fri, 21 Feb 2020 15:26:53 GMT Full Article headline usa virus china conference rsa
av E-Borders Kills Off UK-Ireland Passport Free Travel By packetstormsecurity.com Published On :: Thu, 25 Oct 2007 09:57:49 GMT Full Article britain passport ireland
av Oce Colorwave 500 CSRF / XSS / Authentication Bypass By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 22:03:23 GMT Oce Colorwave 500 printer suffers from authentication bypass, cross site request forgery, and cross site scripting vulnerabilities. Full Article
av Liferay Portal Java Unmarshalling Remote Code Execution By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:57:25 GMT This Metasploit module exploits a Java unmarshalling vulnerability via JSONWS in Liferay Portal versions prior to 6.2.5 GA6, 7.0.6 GA7, 7.1.3 GA4, and 7.2.1 GA2 to execute code as the Liferay user. Tested against 7.2.0 GA1. Full Article
av QRadar Community Edition 7.3.1.6 Path Traversal By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:30:41 GMT QRadar Community Edition version 7.3.1.6 has a path traversal that exists in the session validation functionality. In particular, the vulnerability is present in the part that handles session tokens (UUIDs). QRadar fails to validate if the user-supplied token is in the correct format. Using path traversal it is possible for authenticated users to impersonate other users, and also to executed arbitrary code (via Java deserialization). The code will be executed with the privileges of the Tomcat system user. Full Article
av Researchers Hide Malware In Intel SGX Enclaves By packetstormsecurity.com Published On :: Tue, 12 Feb 2019 17:37:55 GMT Full Article headline hacker malware intel
av Navy Denies It Pirated 558K Copies Of Software By packetstormsecurity.com Published On :: Tue, 15 Nov 2016 00:59:36 GMT Full Article headline government usa fraud pirate
av Easy Transfer 1.7 Cross Site Scripting / Directory Traversal By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:52:49 GMT Easy Transfer version 1.7 for iOS suffers from cross site scripting and directory traversal vulnerabilities. Full Article
av Accepting Network Update Texts Could Have Pwned Your Mobe By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 13:39:40 GMT Full Article headline hacker phone flaw israel google
av Coronavirus Tracking App Locks Up Android Phones For Ransom By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 14:23:02 GMT Full Article headline malware virus phone google
av WhatsApp Executives Come To Brazil To Avoid New Bans By packetstormsecurity.com Published On :: Mon, 05 Jun 2017 18:40:42 GMT Full Article headline government privacy facebook brazil cryptography
av Coronavirus Delays Debut Of Taiwan Electronic ID Card By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:39:46 GMT Full Article headline government privacy virus china taiwan
av Phrack - Attacking JavaScript Engines By packetstormsecurity.com Published On :: Tue, 26 Sep 2017 03:33:33 GMT Phrack: Attacking JavaScript Engines: A case study of JavaScriptCore and CVE-2016-4622. Full Article
av Half Of Industrial Control System Networks Have Faced Cyber Attacks, Say Security Researchers By packetstormsecurity.com Published On :: Wed, 27 Mar 2019 14:49:32 GMT Full Article headline hacker cyberwar scada
av Hackers Hit US Health Agency During Coronavirus Crisis By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:45:12 GMT Full Article headline hacker government usa virus
av Google / Verily Clarify Their Roles In The US Coronavirus Response By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:45:53 GMT Full Article headline government usa virus google
av New York May Be Weeks Away From Peak Of Coronavirus By packetstormsecurity.com Published On :: Sat, 28 Mar 2020 15:12:54 GMT Full Article headline government usa virus
av Trump Administration's Lack Of A Unified Coronavirus Strategy Will Cost Lives, A Dozen Experts Say By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:05 GMT Full Article headline government usa virus
av Packet Storm Exploit 2013-0811-1 - Oracle Java storeImageArray() Invalid Array Indexing Code Execution By packetstormsecurity.com Published On :: Mon, 12 Aug 2013 04:11:58 GMT Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
av Packet Storm Advisory 2013-0811-1 - Oracle Java storeImageArray() By packetstormsecurity.com Published On :: Mon, 12 Aug 2013 04:34:58 GMT Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was obtained through the Packet Storm Bug Bounty program. Full Article
av Packet Storm Exploit 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 02:59:49 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
av Packet Storm Advisory 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 03:12:44 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
av Java storeImageArray() Invalid Array Indexing By packetstormsecurity.com Published On :: Fri, 16 Aug 2013 23:52:40 GMT This Metasploit module abuses an Invalid Array Indexing Vulnerability on the static function storeImageArray() function in order to produce a memory corruption and finally escape the Java Sandbox. The vulnerability affects Java version 7u21 and earlier. The module, which doesn't bypass click2play, has been tested successfully on Java 7u21 on Windows and Linux systems. This was created based upon the Packet Storm Bug Bounty release for this issue. Full Article
av Packet Storm Exploit 2013-0819-1 - Oracle Java BytePackedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:28:12 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
av Packet Storm Advisory 2013-0819-1 - Oracle Java BytePackedRaster.verify() By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:33:00 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
av Packet Storm Exploit 2013-0827-1 - Oracle Java ByteComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:58:22 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
av Packet Storm Advisory 2013-0827-1 - Oracle Java ByteComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:59:52 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
av Packet Storm Exploit 2013-0917-1 - Oracle Java ShortComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:45:32 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
av Packet Storm Advisory 2013-0917-1 - Oracle Java ShortComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:50:06 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
av Furukawa Electric ConsciusMAP 2.8.1 Java Deserialization Remote Code Execution By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:40:45 GMT Furukawa Electric ConsciusMAP version 2.8.1 java deserialization remote code execution exploit. Full Article
av ManageEngine DataSecurity Plus Path Traversal / Code Execution By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:40:45 GMT ManageEngine DataSecurity Plus versions prior to 6.0.1 and ADAudit Plus versions prior to 6.0.3 suffers from a path traversal vulnerability that can lead to remote code execution. Full Article
av AVideo Platform 8.1 User Enumeration By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:35:58 GMT AVideo Platform version 8.1 suffers from an information disclosure vulnerability that allows for user enumeration. Full Article
av Generic Zip Slip Traversal By packetstormsecurity.com Published On :: Thu, 12 Sep 2019 14:36:50 GMT This is a generic arbitrary file overwrite technique, which typically results in remote command execution. This targets a simple yet widespread vulnerability that has been seen affecting a variety of popular products including HP, Amazon, Apache, Cisco, etc. The idea is that often archive extraction libraries have no mitigations against directory traversal attacks. If an application uses it, there is a risk when opening an archive that is maliciously modified, and results in the embedded payload to be written to an arbitrary location (such as a web root), and results in remote code execution. Full Article
av Fake Coronavirus Emails Impersonate The WHO By packetstormsecurity.com Published On :: Tue, 10 Mar 2020 12:56:27 GMT Full Article headline malware virus trojan fraud
av Coronavirus: How Hackers Are Preying On Fears Of Covid-19 By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:49:24 GMT Full Article headline hacker virus phish
av Coronavirus-Themed Phishing Attacks And Hacking Campaigns Are On The Rise By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:45:57 GMT Full Article headline hacker government virus fraud phish
av Maavi Fuzzing Utility By packetstormsecurity.com Published On :: Mon, 20 Jan 2020 17:58:25 GMT Maavi is a fuzzing tool that scans for vulnerabilities with obfuscated payloads. Has proxy support, records full history of actions, and has various bells and whistles. Full Article
av Trust Fined £225k For Leaving Files In Abandoned Hospital By packetstormsecurity.com Published On :: Tue, 19 Jun 2012 15:39:27 GMT Full Article headline government data loss ireland
av Google Chrome To Block Heavy Ads That Use Too Many Resources By packetstormsecurity.com Published On :: Thu, 04 Jul 2019 14:06:10 GMT Full Article headline google chrome
av The Chrome Web Store Is Currently Facing A Wave Of Fraudulent Transactions By packetstormsecurity.com Published On :: Sat, 25 Jan 2020 16:59:37 GMT Full Article headline cybercrime fraud google chrome
av Tor Project Loses A Third Of Staff In Coronavirus Cuts By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:31 GMT Full Article headline privacy virus cryptography
av US Navy Wants 350 Billion Social Media Posts By packetstormsecurity.com Published On :: Tue, 28 May 2019 14:59:52 GMT Full Article headline government usa cyberwar facebook social twitter military
av Social Media Giants Warn Of AI Moderation Errors As Coronavirus Empties Offices By packetstormsecurity.com Published On :: Tue, 17 Mar 2020 13:06:52 GMT Full Article headline virus google facebook twitter
av Coronavirus: Health Leaders Credentials Dumped Online By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:05:03 GMT Full Article headline hacker government privacy virus data loss password
av Turkey's Entire Citizenship Database May Have Been Leaked By packetstormsecurity.com Published On :: Mon, 04 Apr 2016 14:25:45 GMT Full Article headline government privacy cybercrime data loss fraud identity theft turkey
av Solaris 11.4 xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 15:03:23 GMT Solaris version 11.4 xscreensaver local privilege escalation exploit. Full Article
av Solaris xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 23 Oct 2019 20:15:30 GMT This Metasploit module exploits a vulnerability in xscreensaver versions since 5.06 on unpatched Solaris 11 systems which allows users to gain root privileges. xscreensaver allows users to create a user-owned file at any location on the filesystem using the -log command line argument introduced in version 5.06. This module uses xscreensaver to create a log file in /usr/lib/secure/, overwrites the log file with a shared object, and executes the shared object using the LD_PRELOAD environment variable. This module has been tested successfully on xscreensaver version 5.15 on Solaris 11.1 (x86) and xscreensaver version 5.15 on Solaris 11.3 (x86). Full Article