cr Cracking The Kernel By packetstormsecurity.com Published On :: Tue, 22 May 2007 18:09:42 GMT Full Article australia kernel
cr Kernel Crimps Make Windows 8 A Hacker Hassle By packetstormsecurity.com Published On :: Wed, 10 Oct 2012 16:33:12 GMT Full Article headline hacker microsoft kernel
cr Afghanistan's Karzai Slams United States Over Massacre By packetstormsecurity.com Published On :: Fri, 16 Mar 2012 16:06:55 GMT Full Article headline government usa afghanistan
cr HTC Execs Detained Over Leaked Trade Secrets; Shares Tumble By packetstormsecurity.com Published On :: Mon, 02 Sep 2013 15:14:54 GMT Full Article headline phone cybercrime data loss fraud taiwan
cr Google Earth Accidentally Reveals Secret Military Sites By packetstormsecurity.com Published On :: Mon, 18 Feb 2019 15:39:49 GMT Full Article headline government data loss cyberwar google spyware taiwan military
cr Microsoft Patches 18 Year Old Windows Zero Day By packetstormsecurity.com Published On :: Wed, 14 Aug 2019 15:52:49 GMT Full Article microsoft flaw patch zero day
cr How Google Changed The Secretive Market For The Most Dangerous Hacks In The World By packetstormsecurity.com Published On :: Mon, 23 Sep 2019 16:54:39 GMT Full Article headline hacker flaw google zero day
cr AoA DVD Creator 2.6.2 Active-X Overflow By packetstormsecurity.com Published On :: Tue, 20 May 2014 00:11:11 GMT AoA DVD Creator version 2.6.2 suffers from an overflow vulnerability. Full Article
cr Micro Focus Rumba 9.3 Active-X Stack Buffer Overflow By packetstormsecurity.com Published On :: Mon, 31 Oct 2016 06:22:22 GMT Micro Focus Rumba versions 9.3 and below suffer from an active-x stack buffer overflow vulnerability. Full Article
cr Microsoft Windows 10 scrrun.dll Active-X Creation / Deletion Issues By packetstormsecurity.com Published On :: Wed, 06 Jun 2018 20:22:22 GMT scrrun.dll on Microsoft Windows 10 suffers from file creation, folder creation, and folder deletion vulnerabilities. Full Article
cr Apache James Server 2.3.2 Insecure User Creation / Arbitrary File Write By packetstormsecurity.com Published On :: Thu, 20 Feb 2020 21:25:29 GMT This Metasploit module exploits a vulnerability that exists due to a lack of input validation when creating a user. Messages for a given user are stored in a directory partially defined by the username. By creating a user with a directory traversal payload as the username, commands can be written to a given directory. To use this module with the cron exploitation method, run the exploit using the given payload, host, and port. After running the exploit, the payload will be executed within 60 seconds. Due to differences in how cron may run in certain Linux operating systems such as Ubuntu, it may be preferable to set the target to Bash Completion as the cron method may not work. If the target is set to Bash completion, start a listener using the given payload, host, and port before running the exploit. After running the exploit, the payload will be executed when a user logs into the system. For this exploitation method, bash completion must be enabled to gain code execution. This exploitation method will leave an Apache James mail object artifact in the /etc/bash_completion.d directory and the malicious user account. Full Article
cr Amcrest Dahua NVR Camera IP2M-841 Denial Of Service By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:48:06 GMT Amcrest Dahua NVR Camera IP2M-841 denial of service proof of concept exploit. Full Article
cr AG Barr Asks Facebook To Not Use End To End Encryption By packetstormsecurity.com Published On :: Fri, 04 Oct 2019 13:47:34 GMT Full Article headline government privacy usa spyware facebook social cryptography
cr Truecrypt Is Alive And Well And Living In Switzerland By packetstormsecurity.com Published On :: Tue, 03 Jun 2014 01:48:34 GMT Full Article headline privacy cryptography switzerland
cr Encrypted Email Service ProtonMail Opens Door For Tor Users By packetstormsecurity.com Published On :: Thu, 19 Jan 2017 13:55:21 GMT Full Article headline government privacy email spyware cryptography switzerland
cr Trafscrambler Anti-Sniffer For OS X By packetstormsecurity.com Published On :: Fri, 26 Jun 2009 17:47:47 GMT Trafscrambler is an anti-sniffer/IDS NKE (Network Kernel Extension) for Mac OS X. This initial release implements SYN-decoy, Pre/Post connections SYN, TCP reset, and zero window attacks. Author tested this on x86 OS X versions 10.5.6 and 10.5.7. It should work on PPC and older releases as well. Full Article
cr Trafscrambler Anti-Sniffer For OS X By packetstormsecurity.com Published On :: Sat, 15 Aug 2009 20:37:41 GMT Trafscrambler is an anti-sniffer/IDS NKE (Network Kernel Extension) for Mac OS X. Author tested this on x86 OS X versions 10.5.6 and 10.5.7. It should work on PPC and older releases as well. Full Article
cr Trafscrambler Anti-Sniffer For OS X By packetstormsecurity.com Published On :: Mon, 07 Sep 2009 15:48:16 GMT Trafscrambler is an anti-sniffer/IDS NKE (Network Kernel Extension) for Mac OS X. Author tested this on x86 OS X versions 10.5.6 and 10.5.7. It should work on PPC and older releases as well. Full Article
cr Inout PPC Engine Cross Site Request Forgery By packetstormsecurity.com Published On :: Sun, 11 Mar 2012 15:22:22 GMT Inout PPC Engine suffers from a cross site request forgery vulnerability. Full Article
cr Police Say Oslo Suspect Admits To 'Facts' In Massacre By packetstormsecurity.com Published On :: Sun, 24 Jul 2011 15:52:52 GMT Full Article headline terror norway
cr Anonymous Lashes Out At Norway Massacre Suspect By packetstormsecurity.com Published On :: Tue, 26 Jul 2011 04:32:40 GMT Full Article headline terror anonymous norway
cr Hacker Site's Incriminating Database Published Online By Rivals By packetstormsecurity.com Published On :: Tue, 13 Aug 2019 14:29:24 GMT Full Article headline hacker privacy database data loss cyberwar
cr Gootkit Crew Left Database Exposed Without A Password By packetstormsecurity.com Published On :: Tue, 17 Sep 2019 14:27:20 GMT Full Article headline malware database data loss fraud
cr ZDI Is Throwing Out $200k Bug Bounties On Apache And Microsoft IIS By packetstormsecurity.com Published On :: Wed, 25 Jul 2018 17:02:50 GMT Full Article headline hacker microsoft flaw apache
cr Apache Hadoop Spins Cracking Code Injection Vulnerability YARN By packetstormsecurity.com Published On :: Mon, 26 Nov 2018 15:31:20 GMT Full Article headline flaw apache
cr Web Tools Create XSS Headaches By packetstormsecurity.com Published On :: Mon, 07 Jan 2008 15:48:51 GMT Full Article xss
cr Facebook Vulnerable To Critical XSS, Could Lead To Malware Attacks By packetstormsecurity.com Published On :: Fri, 23 May 2008 08:26:21 GMT Full Article malware facebook xss
cr Scripting Bugs Blight Security Giants' Websites By packetstormsecurity.com Published On :: Fri, 13 Jun 2008 03:15:52 GMT Full Article xss
cr Yahoo Fixes Email Cross-Site Scripting Flaw By packetstormsecurity.com Published On :: Wed, 25 Jun 2008 18:27:02 GMT Full Article email flaw yahoo xss
cr Attention Symantec - There Is A Bug Crawling On Your Website By packetstormsecurity.com Published On :: Wed, 15 Apr 2009 10:59:55 GMT Full Article symantec xss
cr Facebook App Flaws Create Trojan Download Risk By packetstormsecurity.com Published On :: Mon, 21 Sep 2009 16:04:03 GMT Full Article trojan flaw facebook xss
cr Microsoft To Fix IE8 Cross-Site Scripting Problem, Again By packetstormsecurity.com Published On :: Tue, 20 Apr 2010 21:45:20 GMT Full Article microsoft xss
cr Serious XSS Flaw Haunts Microsoft SharePoint By packetstormsecurity.com Published On :: Thu, 29 Apr 2010 04:24:15 GMT Full Article microsoft flaw xss
cr Kenya Breaks Chinese-Run Cyber Crime Network By packetstormsecurity.com Published On :: Thu, 04 Dec 2014 16:23:39 GMT Full Article headline hacker china cybercrime fraud africa cyberwar
cr Can Africa Fight Cybercrime And Preserve Human Rights? By packetstormsecurity.com Published On :: Fri, 10 Apr 2015 14:25:53 GMT Full Article headline government cybercrime fraud africa
cr JUNOS (Juniper) Flaw Exposes Core Routers To Kernel Crash By packetstormsecurity.com Published On :: Wed, 06 Jan 2010 03:10:59 GMT Full Article flaw kernel juniper
cr "Unauthorized Code" In Juniper Firewalls Decrypts Encrypted VPN Traffic By packetstormsecurity.com Published On :: Fri, 18 Dec 2015 01:55:21 GMT Full Article headline privacy flaw juniper backdoor cryptography
cr Juniper Slips Out Update After Hardcoded Credentials Left In Switches By packetstormsecurity.com Published On :: Fri, 12 Apr 2019 15:13:25 GMT Full Article headline data loss flaw password patch juniper
cr India Cracks Down On The Blackberry By packetstormsecurity.com Published On :: Tue, 09 Aug 2011 02:19:13 GMT Full Article headline india blackberry
cr RIM Denies Giving India BlackBerry Encryption Keys By packetstormsecurity.com Published On :: Thu, 02 Aug 2012 15:04:37 GMT Full Article headline india blackberry cryptography
cr Dutch Police Claim They Can Decrypt Messages On BlackBerry By packetstormsecurity.com Published On :: Tue, 12 Jan 2016 14:44:18 GMT Full Article headline government privacy phone blackberry cryptography
cr BlackBerry Hits Back At PGP Encryption Cracking Claims By packetstormsecurity.com Published On :: Fri, 15 Jan 2016 13:29:31 GMT Full Article headline government flaw blackberry cryptography
cr BlackBerry CEO 'Disturbed' By Apple's Hard Line On Encryption By packetstormsecurity.com Published On :: Wed, 20 Jul 2016 16:36:13 GMT Full Article headline government privacy usa apple blackberry cryptography
cr Microsoft Internet Explorer Zero Day Flaw Addressed By packetstormsecurity.com Published On :: Tue, 24 Sep 2019 16:58:49 GMT Full Article headline microsoft flaw patch
cr Criminals Start Cashing In On Vulnerable WordPress Websites By packetstormsecurity.com Published On :: Thu, 23 Feb 2017 16:39:46 GMT Full Article headline cybercrime fraud flaw wordpress
cr Critical XSS Vulnerability Patched In WordPress Plugin GDPR Cookie Consent By packetstormsecurity.com Published On :: Thu, 13 Feb 2020 15:20:48 GMT Full Article headline flaw wordpress
cr NASA Hack: AnonSec Attempts To Crash $222m Drone, Release Secret Flight Videos And Employee Data By packetstormsecurity.com Published On :: Mon, 01 Feb 2016 16:45:05 GMT Full Article headline hacker government space data loss cyberwar spyware science nasa
cr Dassault Systèmes and SATS Create World’s First Virtual Kitchen for In-Flight Catering Production By www.3ds.com Published On :: Tue, 23 Jul 2019 10:23:51 +0200 •Dassault Systèmes collaborated with SATS, Asia’s leading food solutions and gateway services provider, to boost operational efficiency, minimize food waste •Growth in airline passenger travel underscores need for sustainable excellence in aerospace industry-related commercial services •Digital twin experience with the 3DEXPERIENCE platform bridges the gap between the virtual and real for in-flight catering production Full Article 3DEXPERIENCE DELMIA Aerospace & Defense Customers
cr Eviation Completes the First Prototype of its Zero-Emission Electric Commuter Aircraft with Dassault Systèmes By www.3ds.com Published On :: Thu, 24 Oct 2019 16:02:34 +0200 ●Electric air mobility pioneer used the 3DEXPERIENCE platform on the cloud to develop prototype in two years ●“Reinvent the Sky” industry solution experience provides full data security in a single, standards-based environment ●Dassault Systèmes enables companies of all sizes to create new categories of sustainable air mobility systems that will change how the world travels Full Article 3DEXPERIENCE Aerospace & Defense Customers
cr Wii Hack Simulates Microsoft Surface By packetstormsecurity.com Published On :: Tue, 22 Jan 2008 11:45:36 GMT Full Article microsoft nintendo