x Mexican Drug Runners Torture And Decaptitate Blogger By packetstormsecurity.com Published On :: Thu, 10 Nov 2011 15:46:59 GMT Full Article headline anonymous mexico
x Mexico Shuts Down Drug Gang's Antennas, Radios By packetstormsecurity.com Published On :: Mon, 05 Dec 2011 15:57:03 GMT Full Article headline phone science mexico
x Mexican Hackers Hit Official Websites In Cyber Protest By packetstormsecurity.com Published On :: Mon, 17 Sep 2012 14:58:01 GMT Full Article headline hacker government mexico
x Pro-Government Twitter Bots Try To Hush Mexican Activists By packetstormsecurity.com Published On :: Mon, 24 Aug 2015 13:43:19 GMT Full Article headline government botnet cyberwar spyware twitter mexico
x 93 Million Mexican Voters Have Had Their Information Compromised By packetstormsecurity.com Published On :: Mon, 25 Apr 2016 14:01:58 GMT Full Article headline government privacy data loss mexico
x A 'Hacker' Exposed A Drug Lord And Is Trying To Save His Own Life By packetstormsecurity.com Published On :: Thu, 18 May 2017 14:15:13 GMT Full Article headline government cyberwar mexico
x Mexico Spied On Journalists, Lawyers, And Activists By packetstormsecurity.com Published On :: Tue, 20 Jun 2017 14:28:01 GMT Full Article headline privacy phone spyware mexico
x Mexican Tax Refund Site Leaked 400GB Of Sensitive Customer Info By packetstormsecurity.com Published On :: Sat, 09 Sep 2017 16:22:32 GMT Full Article headline government privacy data loss fraud mexico
x Hacker Dumps Thousands Of Sensitive Mexican Embassy Documents Online By packetstormsecurity.com Published On :: Sun, 21 Apr 2019 15:59:17 GMT Full Article headline hacker government privacy data loss mexico
x ACM-CFP2007.txt By packetstormsecurity.com Published On :: Wed, 20 Jun 2007 05:02:32 GMT The 5th ACM Workshop On Recurring Malcode (WORM) 2007 Call For Papers has been announced. It will be held on November 2, 2007 in Alexandria, VA, USA. Full Article
x vbulletin-xssxsrf.txt By packetstormsecurity.com Published On :: Thu, 20 Nov 2008 22:44:51 GMT The Visitor Messages add-on for vBulletin version 3.7.3 suffers from cross site scripting and cross site request forgery vulnerabilities. This is a worm exploit that takes advantage of these issues. Full Article
x Exploit Web 2.0, Real Life XSS-Worm By packetstormsecurity.com Published On :: Thu, 05 Feb 2009 22:08:04 GMT Whitepaper called Exploiting Web 2.0, Real Life XSS-Worm. Full Article
x Using ShoutBoxes To Control Malicious Software By packetstormsecurity.com Published On :: Tue, 14 Apr 2009 23:17:50 GMT Whitepaper called Using "ShoutBoxes" to control malicious software. Full Article
x PHP-Nuke 7.0 / 8.1 / 8.1.35 Wormable Remote Code Execution By packetstormsecurity.com Published On :: Wed, 05 May 2010 00:53:06 GMT PHP-Nuke versions 7.0, 8.1 and 8.1.35 wormable remote code execution exploit. Full Article
x Linksys E-Series Remote Code Execution By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 03:33:33 GMT Linksys E-Series unauthenticated remote command execution exploit that leverages the same vulnerability as used in the "Moon" worm. Full Article
x Linux Security Checklist Tool 2.0.3 By packetstormsecurity.com Published On :: Thu, 03 Feb 2011 15:31:32 GMT Linux Security Checklist is a perl script that audits a given Linux host and provides recommendations for security enhancements. Full Article
x CA-92:04.ATT.rexecd.vulnerability By packetstormsecurity.com Published On :: Tue, 14 Sep 1999 05:47:01 GMT A vulnerability is present in AT&T TCP/IP Release 4.0 running on SVR4 systems for both the 386/486 and 3B2 RISC platforms. The problem is in the remote execution server /usr/etc/rexecd and a new version of rexecd is available from AT&T. Full Article
x Opera Adds Security, Firefox Coming By packetstormsecurity.com Published On :: Thu, 12 Jun 2008 08:08:45 GMT Full Article mozilla opera firefox
x Opera Bitten By Extremely Severe Browser Bug By packetstormsecurity.com Published On :: Thu, 09 Oct 2008 00:05:50 GMT Full Article opera
x Opera Releases Update For Extremely Severe Vulns By packetstormsecurity.com Published On :: Tue, 16 Dec 2008 09:27:24 GMT Full Article opera
x Opera 9.64 Update Fixes Several Security Issues By packetstormsecurity.com Published On :: Wed, 04 Mar 2009 10:27:33 GMT Full Article opera
x Opera Browser Dinged By Code Execution Flaw By packetstormsecurity.com Published On :: Wed, 28 Oct 2009 17:08:56 GMT Full Article flaw opera
x Opera Fixes Critical Form-Handling Flaw By packetstormsecurity.com Published On :: Fri, 28 Jan 2011 16:43:24 GMT Full Article headline opera
x Firefox, Opera Allow Crooks To Hide An Entire Phish Site In A Link By packetstormsecurity.com Published On :: Tue, 04 Sep 2012 15:05:05 GMT Full Article headline flaw opera phish firefox
x Opera Updates Browser With Slew Of Security Fixes By packetstormsecurity.com Published On :: Thu, 31 Jan 2013 15:45:54 GMT Full Article headline flaw patch opera
x xdial.zip By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:14:22 GMT No information is available for this file. Full Article
x vex_war.zip By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:14:22 GMT No information is available for this file. Full Article
x WarVOX Telephony Auditing Tool By packetstormsecurity.com Published On :: Fri, 06 Mar 2009 18:58:11 GMT WarVOX is a suite of tools for exploring, classifying, and auditing telephone systems. Unlike normal wardialing tools, WarVOX works with the actual audio from each call and does not use a modem directly. This model allows WarVOX to find and classify a wide range of interesting lines, including modems, faxes, voice mail boxes, PBXs, loops, dial tones, IVRs, and forwarders. WarVOX provides the unique ability to classify all telephone lines in a given range, not just those connected to modems, allowing for a comprehensive audit of a telephone system. Full Article
x Interweb Chuck Norris Infiltrates Netflix, Tivo By packetstormsecurity.com Published On :: Fri, 27 Mar 2009 10:33:28 GMT Full Article csrf
x Kim Dotcom Loses Latest Appeal Against US Extradition By packetstormsecurity.com Published On :: Thu, 05 Jul 2018 16:09:00 GMT Full Article headline government usa fraud mpaa new zealand
x Researchers Compromise Netflix Content In Widevine DRM Hack By packetstormsecurity.com Published On :: Wed, 01 May 2019 14:26:33 GMT Full Article headline flaw mpaa cryptography
x iXKeyLog 0.1 By packetstormsecurity.com Published On :: Sun, 06 Nov 2011 23:40:52 GMT iXKeylog is an X11 keylogger for Unix that basically uses xlib to interact with the users keyboard. It will listen for certain X11 events and then trigger specific routines to handle these events. Full Article
x Xenotix Python Keylogger For Windows By packetstormsecurity.com Published On :: Tue, 07 May 2013 13:33:33 GMT Xenotix is a keylogger for windows that is written in Python. It has the ability to send logs remotely. Full Article
x eBay Year-Long Patch Stall A Little XSSive By packetstormsecurity.com Published On :: Thu, 30 Apr 2015 13:57:01 GMT Full Article headline flaw ebay
x eBay Refuses To Fix Flaw Exposing Users To Malware And Phishing Attacks By packetstormsecurity.com Published On :: Tue, 02 Feb 2016 16:48:11 GMT Full Article headline malware flaw ebay phish
x Websites Fixing Heartbleed Bug, VPNs Still Vulnerable By packetstormsecurity.com Published On :: Sat, 19 Apr 2014 00:59:49 GMT Full Article headline privacy flaw ssl cryptography
x Android 4.4.4 Kitkat Unexpectedly Arrives With OpenSSL Fix By packetstormsecurity.com Published On :: Fri, 20 Jun 2014 15:38:31 GMT Full Article headline phone flaw google patch ssl
x US Hospital Hack 'Exploited Heartbleed Flaw' By packetstormsecurity.com Published On :: Wed, 20 Aug 2014 15:07:18 GMT Full Article headline hacker privacy china data loss flaw ssl cryptography
x Novell ZENworks Configuration Management Remote Execution By packetstormsecurity.com Published On :: Tue, 02 Apr 2013 15:07:51 GMT This Metasploit module exploits a code execution flaw in Novell ZENworks Configuration Management 10 SP3 and 11 SP2. The vulnerability exists in the ZEnworks Control Center application, allowing an unauthenticated attacker to upload a malicious file outside of the TEMP directory and then make a second request that allows for arbitrary code execution. This Metasploit module has been tested successfully on Novell ZENworks Configuration Management 10 SP3 and 11 SP2 on Windows 2003 SP2 and SUSE Linux Enterprise Server 10 SP3. Full Article
x Mandriva Linux Security Advisory 2015-046 By packetstormsecurity.com Published On :: Thu, 12 Feb 2015 16:45:56 GMT Mandriva Linux Security Advisory 2015-046 - Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. Full Article
x Mandriva Linux Security Advisory 2015-140 By packetstormsecurity.com Published On :: Mon, 30 Mar 2015 21:48:37 GMT Mandriva Linux Security Advisory 2015-140 - If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. A remote unauthenticated attacker may craft special packets that trigger buffer overflows in the ntpd functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure(). The resulting buffer overflows may be exploited to allow arbitrary malicious code to be executed with the privilege of the ntpd process. A section of code in ntpd handling a rare error is missing a return statement, therefore processing did not stop when the error was encountered. This situation may be exploitable by an attacker. Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. The ntp package has been patched to fix these issues. Full Article
x IBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution By packetstormsecurity.com Published On :: Tue, 22 Aug 2017 05:44:56 GMT This Metasploit module exploits an unauthenticated remote PHP code execution vulnerability in IBM OpenAdmin Tool included with IBM Informix versions 11.5, 11.7, and 12.1. The 'welcomeServer' SOAP service does not properly validate user input in the 'new_home_page' parameter of the 'saveHomePage' method allowing arbitrary PHP code to be written to the config.php file. The config.php file is executed in most pages within the application, and accessible directly via the web root, resulting in code execution. This Metasploit module has been tested successfully on IBM OpenAdmin Tool 3.14 on Informix 12.10 Developer Edition (SUSE Linux 11) virtual appliance. Full Article
x Security Research Exception To DMCA Considered By packetstormsecurity.com Published On :: Tue, 13 May 2003 07:52:12 GMT Full Article dmca
x Court Adds New DMCA Exceptions By packetstormsecurity.com Published On :: Wed, 29 Oct 2003 02:40:24 GMT Full Article government dmca
x Hackers, Others Seek DMCA Exemptions By packetstormsecurity.com Published On :: Wed, 03 Dec 2008 05:30:42 GMT Full Article hacker dmca
x Apple Files Opposition To DMCA Exemption For Jailbreaking By packetstormsecurity.com Published On :: Fri, 13 Feb 2009 12:00:58 GMT Full Article phone dmca apple
x Debian Linux Security Advisory 830-1 By packetstormsecurity.com Published On :: Tue, 04 Oct 2005 03:09:21 GMT Debian Security Advisory DSA 830-1 - Drew Parsons noticed that the post-installation script of ntlmaps, an NTLM authorization proxy server, changes the permissions of the configuration file to be world-readable. It contains the user name and password of the Windows NT system that ntlmaps connects to and, hence, leaks them to local users. Full Article
x EEYEB-20050523.txt By packetstormsecurity.com Published On :: Wed, 14 Dec 2005 07:57:35 GMT eEye Security Advisory - eEye Digital Security has discovered a local privilege escalation vulnerability in the Windows kernel that could allow any code executing on a Windows NT 4.0 or Windows 2000 system to elevate itself to the highest possible local privilege level (kernel). Full Article
x AD20060509a.txt By packetstormsecurity.com Published On :: Sun, 21 May 2006 17:51:29 GMT eEye Digital Security has discovered a second vulnerability in the Microsoft Distributed Transaction Coordinator that could allow an attacker to take complete control over a vulnerable system to which he has network or local access. The vulnerable MSDTC component is an RPC server which is network accessible by default on Windows NT 4.0 Server and Windows 2000 Server systems, over a dynamic high TCP port. Full Article
x winntcomp.txt By packetstormsecurity.com Published On :: Thu, 04 Jan 2007 02:53:42 GMT A critical security vulnerability has been found in the Windows NT Message compiler. Arbitrary code execution might be possible. Full Article