cl Oracle Gets Busy With Lazy FPU Fix By packetstormsecurity.com Published On :: Tue, 26 Jun 2018 15:49:59 GMT Full Article headline flaw oracle intel
cl Researchers Hide Malware In Intel SGX Enclaves By packetstormsecurity.com Published On :: Tue, 12 Feb 2019 17:37:55 GMT Full Article headline hacker malware intel
cl The Pirate Bay Uses The Cloud To Stay Out Of Law Enforcement's Reach By packetstormsecurity.com Published On :: Mon, 22 Sep 2014 15:20:35 GMT Full Article headline government riaa mpaa pirate
cl Online Clothing Store 1.0 Cross Site Scripting By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:53:08 GMT Online Clothing Store version 1.0 suffers from a persistent cross site scripting vulnerability. Full Article
cl Fingerprint Cloning: Myth Or Reality? By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 15:36:08 GMT Full Article headline phone flaw password cisco
cl Zero-Click, Zero-Day Flaws In iOS Mail Used In Targeted VIP Attacks By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:15:08 GMT Full Article headline hacker phone flaw apple zero day
cl US And Russia Clash Over Power Grid Hack Attacks By packetstormsecurity.com Published On :: Tue, 18 Jun 2019 15:59:50 GMT Full Article headline government usa russia cyberwar scada
cl North Korean Malware Found On Indian Nuclear Plant's Network By packetstormsecurity.com Published On :: Wed, 30 Oct 2019 15:36:43 GMT Full Article headline hacker government india cyberwar korea scada
cl Juniper VPN Client rdesktop Click Hack By packetstormsecurity.com Published On :: Mon, 22 Nov 2010 12:43:33 GMT Juniper VPN client with remote desktop lets an attacking spawn Internet Explorer prior to authentication. Full Article
cl Google / Verily Clarify Their Roles In The US Coronavirus Response By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:45:53 GMT Full Article headline government usa virus google
cl Azure Cloud Penetration Testing By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 21:29:55 GMT Whitepaper called Azure Cloud Penetration Testing. Full Article
cl Exploiting CAN-Bus Using Instrument Cluster Simulator By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:21:38 GMT Whitepaper called Exploiting CAN-Bus using Instrument Cluster Simulator. Full Article
cl Packet Storm Advisory 2013-0621 - Facebook Information Disclosure By packetstormsecurity.com Published On :: Fri, 21 Jun 2013 20:56:14 GMT Facebook suffered from an information disclosure vulnerability. If a user uploaded their contacts to Facebook and then proceeded to download their expanded dataset from the DYI (Download Your Information) section, they would receive a file called addressbook.html in their downloaded archive. The addressbook.html is supposed to house the contact information they uploaded. However, due to a flaw in how Facebook implemented this, it also housed contact information from other uploads other users have performed for the same person, provided they had one piece of matching data. This effectively built large dossiers on users and disclosed their information to anyone that knew at least one piece of matching data. Full Article
cl Packet Storm Exploit 2013-0811-1 - Oracle Java storeImageArray() Invalid Array Indexing Code Execution By packetstormsecurity.com Published On :: Mon, 12 Aug 2013 04:11:58 GMT Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
cl Packet Storm Advisory 2013-0811-1 - Oracle Java storeImageArray() By packetstormsecurity.com Published On :: Mon, 12 Aug 2013 04:34:58 GMT Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was obtained through the Packet Storm Bug Bounty program. Full Article
cl Packet Storm Exploit 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 02:59:49 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
cl Packet Storm Advisory 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 03:12:44 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
cl Packet Storm Exploit 2013-0819-1 - Oracle Java BytePackedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:28:12 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
cl Packet Storm Advisory 2013-0819-1 - Oracle Java BytePackedRaster.verify() By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:33:00 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
cl Packet Storm Exploit 2013-0827-1 - Oracle Java ByteComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:58:22 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
cl Packet Storm Advisory 2013-0827-1 - Oracle Java ByteComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:59:52 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
cl Packet Storm Exploit 2013-0917-1 - Oracle Java ShortComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:45:32 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
cl Packet Storm Advisory 2013-0917-1 - Oracle Java ShortComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:50:06 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
cl Packet Storm Exploit 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 00:55:43 GMT This exploit leverages both invalid typecast and memory disclosure vulnerabilities in Microsoft Silverlight 5 in order to achieve code execution. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected". Full Article
cl Packet Storm Advisory 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 01:03:08 GMT Microsoft Silverlight 5 suffers from invalid typecast and memory disclosure vulnerabilities that, when leveraged together, allow for arbitrary code execution. A memory disclosure vulnerability exists in the public WriteableBitmap class from System.Windows.dll. This class allows reading of image pixels from the user-defined data stream via the public SetSource() method. BitmapSource.ReadStream() allocates and returns byte array and a count of array items as out parameters. These returned values are taken from the input stream and they can be fully controlled by the untrusted code. When returned "count" is greater than "array.Length", then data outside the "array" are used as input stream data by the native BitmapSource_SetSource() from agcore.dll. Later all data can be viewed via the public WriteableBitmap.Pixels[] property. Exploitation details related to these findings were purchased through the Packet Storm Bug Bounty program. Full Article
cl WordPress Media Library Assistant 2.81 Local File Inclusion By packetstormsecurity.com Published On :: Mon, 13 Apr 2020 11:01:11 GMT WordPress Media Library Assistant plugin version 2.81 suffers from a local file inclusion vulnerability. Full Article
cl Druva inSync Windows Client 6.5.2 Privilege Escalation By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 16:00:54 GMT Druva inSync Windows Client version 6.5.2 suffers from a local privilege escalation vulnerability. Full Article
cl BoltWire 6.03 Local File Inclusion By packetstormsecurity.com Published On :: Mon, 04 May 2020 16:32:12 GMT BoltWire version 6.03 suffers from a local file inclusion vulnerability. Full Article
cl Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:11:57 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (CmResourceTypeDevicePrivate entries). Full Article
cl Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:13:09 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (videoprt.sys descriptors). Full Article
cl Microsoft Windows Kernel REG_RESOURCE_REQUIREMENTS_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:14:27 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_REQUIREMENTS_LIST registry values. Full Article
cl Oracle WebLogic 12.1.2.0 Remote Code Execution By packetstormsecurity.com Published On :: Mon, 09 Jul 2018 13:11:11 GMT Oracle WebLogic version 12.1.2.0 RMI registry UnicastRef object java deserialization remote code execution exploit. Full Article
cl VMware Host VMX Process COM Class Hijack Privilege Escalation By packetstormsecurity.com Published On :: Mon, 25 Mar 2019 16:02:25 GMT The VMX process (vmware-vmx.exe) process configures and hosts an instance of VM. As is common with desktop virtualization platforms the VM host usually has privileged access into the OS such as mapping physical memory which represents a security risk. To mitigate this the VMX process is created with an elevated integrity level by the authentication daemon (vmware-authd.exe) which runs at SYSTEM. This prevents a non-administrator user opening the process and abusing its elevated access. Unfortunately the process is created as the desktop user which results in the elevated process sharing resources such as COM registrations with the normal user who can modify the registry to force an arbitrary DLL to be loaded into the VMX process. Affects VMware Workstation Windows version 14.1.5 (on Windows 10). Also tested on VMware Player version 15. Full Article
cl NSClient++ 0.5.2.35 Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:03:42 GMT NSClient++ version 0.5.2.35 suffers from an authenticated remote code execution vulnerability. Full Article
cl SimplePHPGal 0.7 Remote File Inclusion By packetstormsecurity.com Published On :: Tue, 05 May 2020 20:49:23 GMT SimplePHPGal version 0.7 suffers from a remote file inclusion vulnerability. Full Article
cl NetBSD Stack Clash Proof Of Concept By packetstormsecurity.com Published On :: Thu, 29 Jun 2017 13:33:33 GMT NetBSD stack clash proof of concept exploit. Full Article
cl SoundCloud Tackles DoS, Account Takeover Issues By packetstormsecurity.com Published On :: Thu, 13 Feb 2020 15:20:39 GMT Full Article headline privacy denial of service password
cl Realtek SDK Information Disclosure / Code Execution By packetstormsecurity.com Published On :: Fri, 24 Jan 2020 23:23:23 GMT Realtek SDK based routers suffer from information disclosure, incorrect access control, insecure password storage, code execution, and incorrectly implemented CAPTCHA vulnerabilities. Full Article
cl Centreon 19.10.5 Credential Disclosure By packetstormsecurity.com Published On :: Tue, 28 Jan 2020 15:42:39 GMT Centreon version 19.10.5 suffers from a database credential disclosure vulnerability. Full Article
cl Jira 8.3.4 Information Disclosure By packetstormsecurity.com Published On :: Sun, 02 Feb 2020 09:32:22 GMT Jira version 8.3.4 suffers from a username enumeration information disclosure vulnerability. Full Article
cl Verodin Director Web Console 3.5.4.0 Password Disclosure By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:46:01 GMT Verodin Director Web Console version 3.5.4.0 remote authenticated password disclosure proof of concept exploit. Full Article
cl LabVantage 8.3 Information Disclosure By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 17:27:30 GMT LabVantage version 8.3 suffers from an information disclosure vulnerability. Full Article
cl SmartClient 120 Information Disclosure / XML Injection / LFI / Code Execution By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:12:28 GMT SmartClient version 120 suffers from information disclosure, local file inclusion, remote file upload, and XML external entity injection vulnerabilities. Full Article
cl ManageEngine EventLog Analyzer 10.0 Information Disclosure By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 01:32:22 GMT ManageEngine EventLog Analyzer version 10.0 suffers from an information disclosure vulnerability. Full Article
cl Citrix Gateway 11.1 / 12.0 / 12.1 Information Disclosure By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 17:04:24 GMT Citrix Gateway versions 11.1, 12.0, and 12.1 suffer from an information disclosure vulnerability. Full Article
cl HP ThinPro 6.x / 7.x Information Disclosure By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:23:36 GMT HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a local physical access information disclosure vulnerability. Full Article
cl MicroStrategy Intelligence Server And Web 10.4 XSS / Disclosure / SSRF / Code Execution By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:50:46 GMT MicroStrategy Intelligence Server and Web version 10.4 suffers from remote code execution, cross site scripting, server-side request forgery, and information disclosure vulnerabilities. Full Article
cl Swift File Transfer Mobile Cross Site Scripting / Information Disclosure By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 21:27:35 GMT The Swift File Transfer mobile application for ios, blackberry and android suffers from cross site scripting and information disclosure vulnerabilities. Full Article
cl Edimax EW-7438RPn Information Disclosure By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:07:15 GMT Edimax EW-7438RPn suffers from an information disclosure vulnerability. Full Article
cl File Explorer 1.4 Information Disclosure By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:59:24 GMT File Explorer version 1.4 for iOS suffers from an information disclosure vulnerability. Full Article