ex Attackers Exploit 0-Day Code Execution Flaw In The Sophos Firewall By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:39:49 GMT Full Article headline hacker flaw
ex GitLab Awards Researcher $20,000 For Remote Code Execution Bug By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:28:19 GMT Full Article headline hacker flaw patch
ex Kernel Vulns In Android Devices Using Qualcomm Chips Explored By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:30:42 GMT Full Article headline hacker malware phone flaw google
ex cc-pinextract.txt By packetstormsecurity.com Published On :: Wed, 12 Apr 2000 22:18:10 GMT CRYPTOCard's CRYPTOAdmin software is a challenge/response user authentication administration system. The PT-1 token, which runs on a PalmOS device, generates the one-time-password response. A PalmOS .PDB file is created for each user and loaded onto their Palm device. By gaining access to the .PDB file, the legitimate user's PIN can be determined through a series of DES decrypts-and-compares. Using the demonstration tool, the PIN can be determined in under 5 minutes on a Pentium III 450MHz. Full Article
ex Dridex Trojan Updated With AtomBombing Evasion Techniques By packetstormsecurity.com Published On :: Wed, 01 Mar 2017 15:18:00 GMT Full Article headline malware trojan
ex Dridex Banking Trojan Compromises FTP Sites In New Campaign By packetstormsecurity.com Published On :: Fri, 19 Jan 2018 15:48:28 GMT Full Article headline malware bank trojan cybercrime fraud
ex Trojan Malware Campaign Expands With Attacks Against New Banks By packetstormsecurity.com Published On :: Thu, 23 Aug 2018 15:37:24 GMT Full Article headline malware bank trojan cybercrime fraud
ex Magecart Group Linked To Dridex Banking Trojan, Carbanak By packetstormsecurity.com Published On :: Tue, 22 Oct 2019 17:10:02 GMT Full Article headline hacker malware bank trojan cybercrime fraud
ex JhoneRAT Exploits Cloud To Attack Middle Eastern Countries By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:27:18 GMT Full Article headline malware trojan cyberwar
ex DISA Breach Likely Exposed Personal Data On At Least 200,000 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 14:59:51 GMT Full Article headline government privacy usa data loss flaw cyberwar military
ex FSB Contractor Breach Exposes Secret Cyber Weapons Program By packetstormsecurity.com Published On :: Tue, 24 Mar 2020 14:15:28 GMT Full Article headline government russia cyberwar
ex PHP imap_open Remote Code Execution By packetstormsecurity.com Published On :: Wed, 28 Nov 2018 01:52:56 GMT The imap_open function within PHP, if called without the /norsh flag, will attempt to preauthenticate an IMAP session. On Debian based systems, including Ubuntu, rsh is mapped to the ssh binary. Ssh's ProxyCommand option can be passed from imap_open to execute arbitrary commands. While many custom applications may use imap_open, this exploit works against the following applications: e107 v2, prestashop, SuiteCRM, as well as Custom, which simply prints the exploit strings for use. Prestashop exploitation requires the admin URI, and administrator credentials. suiteCRM/e107/hostcms require administrator credentials. Full Article
ex Spy Campaign Spams Pro-Tibet Group With ExileRAT By packetstormsecurity.com Published On :: Tue, 05 Feb 2019 15:02:59 GMT Full Article headline malware email fraud cyberwar spyware phish
ex Phishing Emails Spoof WebEx Invites, Abuse Open Redirect By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 15:24:24 GMT Full Article headline fraud flaw cisco phish
ex Extensive Hacking Operation Discovered In Kazakhstan By packetstormsecurity.com Published On :: Sun, 24 Nov 2019 20:33:26 GMT Full Article headline hacker government fraud cyberwar phish
ex Spear-Phishing Campaign Compromises Executives At 150+ Companies By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:45:50 GMT Full Article headline hacker africa password phish
ex Nagios XI Authenticated Remote Command Execution By packetstormsecurity.com Published On :: Tue, 10 Mar 2020 13:17:29 GMT This Metasploit module exploits a vulnerability in Nagios XI versions before 5.6.6 in order to execute arbitrary commands as root. The module uploads a malicious plugin to the Nagios XI server and then executes this plugin by issuing an HTTP GET request to download a system profile from the server. For all supported targets except Linux (cmd), the module uses a command stager to write the exploit to the target via the malicious plugin. This may not work if Nagios XI is running in a restricted Unix environment, so in that case the target must be set to Linux (cmd). The module then writes the payload to the malicious plugin while avoiding commands that may not be supported. Valid credentials for a user with administrative privileges are required. This module was successfully tested on Nagios XI 5.6.5 running on CentOS 7. The module may behave differently against older versions of Nagios XI. Full Article
ex Facebook Data Transfers To Be Examined By EU Court By packetstormsecurity.com Published On :: Thu, 12 Apr 2018 15:51:48 GMT Full Article headline government facebook social ireland
ex Search Engine For Japanese Sex Hotels Announces Security Breach By packetstormsecurity.com Published On :: Mon, 06 Jan 2020 16:01:25 GMT Full Article headline privacy data loss japan
ex Google Taking New Steps To Prevent Malicious Chrome Extensions By packetstormsecurity.com Published On :: Wed, 03 Oct 2018 14:03:54 GMT Full Article headline malware google chrome
ex North Korean APT Uses Chrome Extension To Infect Victims By packetstormsecurity.com Published On :: Wed, 05 Dec 2018 15:45:34 GMT Full Article headline hacker government malware cyberwar google korea chrome
ex NoScript Extension Officially Released For Google Chrome By packetstormsecurity.com Published On :: Fri, 12 Apr 2019 15:13:28 GMT Full Article headline google chrome
ex On Halloween Night, Google Discloses Chrome Zero-Day Exploited In The Wild By packetstormsecurity.com Published On :: Fri, 01 Nov 2019 16:52:23 GMT Full Article headline flaw google zero day chrome
ex Google Axes 49 Malicious Chrome Extensions From Web Store By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:06:51 GMT Full Article headline malware google chrome
ex Launcher Execution Mitigation Patch By packetstormsecurity.com Published On :: Fri, 10 Jan 2020 02:33:33 GMT This patch mitigates allowing launcher the ability to execute arbitrary programs. Full Article
ex Leaks Expose Peculiar Facebook Moderation Policy By packetstormsecurity.com Published On :: Mon, 22 May 2017 16:54:30 GMT Full Article headline privacy data loss facebook social censorship
ex Putin Signs Internet Sovereignty Bill That Expands Censorship By packetstormsecurity.com Published On :: Fri, 03 May 2019 14:11:56 GMT Full Article headline government russia censorship
ex The White House Readies Draft Of Executive Order That Could Break The Internet By packetstormsecurity.com Published On :: Sat, 10 Aug 2019 16:23:17 GMT Full Article headline government usa facebook social censorship
ex lc3setup.exe By packetstormsecurity.com Published On :: Thu, 12 Apr 2001 20:47:26 GMT L0phtCrack 3 15 day trial - L0phtCrack is an NT password auditing tool. It will compute NT user passwords from the cryptographic hashes that are stored by the NT operation system. L0phtCrack computes the password from a variety of sources using a variety of methods. Uses include recovering a forgotten password, ensuring that users use strong passwords, retrieving the password of a user in order to impersonate them, or migrating NT users to another platform such as Unix. Tested on Windows 98SE, Windows ME, Windows NT, and Windows 2000. Full Article
ex antexp.zip By packetstormsecurity.com Published On :: Wed, 11 Jul 2001 08:09:19 GMT Advanced NT Security Explorer (ANTExp) is an application for Microsoft Windows NT, Windows 2000 and Windows XP system administrators for finding holes in system security. It analyses user password hashes, and tries to recover plain-text passwords. If it's possible to recover the password in a reasonable time, the password should be considered to be insecure. ANTExp is very fast - tries about 900,000 passwords per second on a Pentium-III/450 CPU. Tested on Windows 95, Windows 98, Windows ME, Windows NT 4.0, Windows 2000, Windows XP. Full Article
ex SolarWinds MSP PME Cache Service Insecure File Permissions / Code Execution By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:17:54 GMT SolarWinds MSP PME Cache Service versions prior to 1.1.15 suffer from insecure file permission and code execution vulnerabilities. Full Article
ex Samsung Android Remote Code Execution By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:12:41 GMT Samsung Android suffers from multiple interaction-less remote code execution vulnerabilities as well as other remote access issues in the Qmage image codec built into Skia. Full Article
ex Western Intelligence Hacked Yandex To Spy On Accounts By packetstormsecurity.com Published On :: Fri, 28 Jun 2019 15:12:22 GMT Full Article headline hacker government usa canada britain russia cyberwar new zealand
ex Facebook Opens Portal Gizmo To Pwn2Own Exploit Fest By packetstormsecurity.com Published On :: Thu, 29 Aug 2019 15:57:28 GMT Full Article headline hacker canada flaw facebook social conference
ex Pwn2Own Expands Into Industrial Control Systems Hacking By packetstormsecurity.com Published On :: Tue, 29 Oct 2019 13:47:52 GMT Full Article headline hacker canada conference scada
ex Pwn2Own Contest Yields 13 Bugs, As Virtual Format Expands Talent Pool By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:38 GMT Full Article headline hacker canada conference
ex Microsoft PowerPoint Viewer TextBytesAtom Stack Buffer Overflow By packetstormsecurity.com Published On :: Fri, 14 May 2010 14:44:02 GMT This Metasploit module exploits a stack buffer overflow vulnerability in the handling of the TextBytesAtom records by Microsoft PowerPoint Viewer. According to Microsoft, the PowerPoint Viewer distributed with Office 2003 SP3 and earlier, as well as Office 2004 for Mac, are vulnerable. NOTE: The vulnerable code path is not reachable on versions of Windows prior to Windows Vista. Full Article
ex Windows Vista/7 lpksetup.exe DLL Hijacking By packetstormsecurity.com Published On :: Wed, 27 Oct 2010 01:49:35 GMT Microsoft Windows Vista/7 suffers from a DLL hijacking vulnerability in lpksetup.exe. Full Article
ex Windows Vista/7 UAC Bypass Exploit By packetstormsecurity.com Published On :: Wed, 24 Nov 2010 22:52:18 GMT Microsoft Windows Vista / 7 privilege escalation exploit that has UAC bypass. Full Article
ex Internet Explorer Script Interjection Code Execution By packetstormsecurity.com Published On :: Fri, 17 Aug 2012 22:22:33 GMT The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur. Full Article
ex Internet Explorer Script Interjection Code Execution By packetstormsecurity.com Published On :: Fri, 07 Sep 2012 03:22:50 GMT The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur. Full Article
ex NTR ActiveX Control Check() Method Buffer Overflow By packetstormsecurity.com Published On :: Sat, 22 Sep 2012 06:44:12 GMT This Metasploit module exploits a vulnerability found in NTR ActiveX 1.1.8. The vulnerability exists in the Check() method, due to the insecure usage of strcat to build a URL using the bstrParams parameter contents, which leads to code execution under the context of the user visiting a malicious web page. In order to bypass DEP and ASLR on Windows Vista and Windows 7 JRE 6 is needed. Full Article
ex HP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:19:31 GMT This Metasploit module exploits a vulnerability on the lrFileIOService ActiveX, as installed with HP LoadRunner 11.50. The vulnerability exists in the WriteFileString method, which allow the user to write arbitrary files. It's abused to drop a payload embedded in a dll, which is later loaded through the Init() method from the lrMdrvService control, by abusing an insecure LoadLibrary call. This Metasploit module has been tested successfully on IE8 on Windows XP. Virtualization based on the Low Integrity Process, on Windows Vista and 7, will stop this module because the DLL will be dropped to a virtualized folder, which isn't used by LoadLibrary. Full Article
ex SolidWorks Workgroup PDM 2014 pdmwService.exe Arbitrary File Write By packetstormsecurity.com Published On :: Thu, 06 Mar 2014 03:15:49 GMT This Metasploit module exploits a remote arbitrary file write vulnerability in SolidWorks Workgroup PDM 2014 SP2 and prior. For targets running Windows Vista or newer the payload is written to the startup folder for all users and executed upon next user logon. For targets before Windows Vista code execution can be achieved by first uploading the payload as an exe file, and then upload another mof file, which schedules WMI to execute the uploaded payload. This Metasploit module has been tested successfully on SolidWorks Workgroup PDM 2011 SP0 on Windows XP SP3 (EN) and Windows 7 SP1 (EN). Full Article
ex MS14-060 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Sat, 18 Oct 2014 00:42:31 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. Full Article
ex MS14-064 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Thu, 13 Nov 2014 17:32:46 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly exploited in the wild as MS14-060 patch bypass. The Microsoft update tried to fix the vulnerability publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. And please keep in mind that some other setups such as using Office 2010 SP1 might be less stable, and sometimes may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
ex MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python By packetstormsecurity.com Published On :: Fri, 14 Nov 2014 00:34:29 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, bypassing the patch MS14-060, for the vulnerability publicly known as "Sandworm", on systems with Python for Windows installed. Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. Please keep in mind that some other setups such as those using Office 2010 SP1 may be less stable, and may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
ex HP Data Protector Encrypted Communication Remote Command Execution By packetstormsecurity.com Published On :: Tue, 07 Jun 2016 07:51:36 GMT This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2. Full Article
ex GOP Canvassing App Credentials Exposed In Code Repository By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:09:13 GMT Full Article headline government privacy usa data loss
ex 14 Million Key Ring Users Exposed In Open Database By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:25 GMT Full Article headline privacy database data loss