cr Internet Explorer Script Interjection Code Execution By packetstormsecurity.com Published On :: Fri, 17 Aug 2012 22:22:33 GMT The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur. Full Article
cr Internet Explorer Script Interjection Code Execution By packetstormsecurity.com Published On :: Fri, 07 Sep 2012 03:22:50 GMT The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur. Full Article
cr MS14-060 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Sat, 18 Oct 2014 00:42:31 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. Full Article
cr MS14-064 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Thu, 13 Nov 2014 17:32:46 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly exploited in the wild as MS14-060 patch bypass. The Microsoft update tried to fix the vulnerability publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. And please keep in mind that some other setups such as using Office 2010 SP1 might be less stable, and sometimes may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
cr MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python By packetstormsecurity.com Published On :: Fri, 14 Nov 2014 00:34:29 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, bypassing the patch MS14-060, for the vulnerability publicly known as "Sandworm", on systems with Python for Windows installed. Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. Please keep in mind that some other setups such as those using Office 2010 SP1 may be less stable, and may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
cr HP Data Protector Encrypted Communication Remote Command Execution By packetstormsecurity.com Published On :: Tue, 07 Jun 2016 07:51:36 GMT This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2. Full Article
cr GOP Canvassing App Credentials Exposed In Code Repository By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:09:13 GMT Full Article headline government privacy usa data loss
cr Coronavirus: Health Leaders Credentials Dumped Online By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:05:03 GMT Full Article headline hacker government privacy virus data loss password
cr Hacker Gains Access To Some Private Microsoft GitHub Repos By packetstormsecurity.com Published On :: Fri, 08 May 2020 14:23:12 GMT Full Article headline hacker microsoft data loss
cr Turkey Hijacks Servers In Social Media Crackdown By packetstormsecurity.com Published On :: Mon, 31 Mar 2014 14:37:14 GMT Full Article headline government dns google turkey twitter censorship
cr US Is Out Of The Picture In Syria-Turkey Crisis. Putin Now Owns This Mess. By packetstormsecurity.com Published On :: Sun, 20 Oct 2019 15:56:43 GMT Full Article headline government usa russia turkey syria military
cr Solaris 11.4 xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 15:03:23 GMT Solaris version 11.4 xscreensaver local privilege escalation exploit. Full Article
cr Solaris xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 23 Oct 2019 20:15:30 GMT This Metasploit module exploits a vulnerability in xscreensaver versions since 5.06 on unpatched Solaris 11 systems which allows users to gain root privileges. xscreensaver allows users to create a user-owned file at any location on the filesystem using the -log command line argument introduced in version 5.06. This module uses xscreensaver to create a log file in /usr/lib/secure/, overwrites the log file with a shared object, and executes the shared object using the LD_PRELOAD environment variable. This module has been tested successfully on xscreensaver version 5.15 on Solaris 11.1 (x86) and xscreensaver version 5.15 on Solaris 11.3 (x86). Full Article
cr Why Big ISPs Aren't Happy About Google's Plans For Encrypted DNS By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 13:50:11 GMT Full Article headline privacy dns google
cr Over 28,000 Web Domains Suspended For Criminal Activity By packetstormsecurity.com Published On :: Fri, 22 Nov 2019 15:38:30 GMT Full Article headline dns cybercrime fraud
cr Microsoft Takes Down 50 Domains Operated By North Korean Hackers By packetstormsecurity.com Published On :: Tue, 31 Dec 2019 14:51:18 GMT Full Article headline hacker microsoft dns cyberwar korea
cr Firefox Turns On Encrypted DNS By Default To Thwart Snooping ISPs By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:00:05 GMT Full Article headline privacy dns mozilla firefox cryptography
cr GoDaddy Hack Breaches Hosting Account Credentials By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:31:15 GMT Full Article headline hacker privacy dns data loss password
cr Open-Xchange OX App Suite Content Spoofing / Cross Site Scripting By packetstormsecurity.com Published On :: Fri, 16 Aug 2019 21:17:15 GMT Open-Xchange OX App Suite suffers from a content spoofing, cross site scripting, and information disclosure vulnerabilities. Versions affected vary depending on the vulnerability. Full Article
cr CurveBall Microsoft Windows CryptoAPI Spoofing Proof Of Concept By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:16:02 GMT This is a proof of concept exploit that demonstrates the Microsoft Windows CryptoAPI spoofing vulnerability as described in CVE-2020-0601 and disclosed by the NSA. Full Article
cr Git Credential Helper Protocol Newline Injection By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:45:49 GMT A git clone action can leak cached / stored credentials for github.com to example.com due to insecure handling of newlines in the credential helper protocol. Full Article
cr PTP-RAT Screen Share Proof Of Concept By packetstormsecurity.com Published On :: Thu, 09 Nov 2017 05:22:22 GMT PTP-RAT is a proof of concept that allows data theft via screen-share protocols. Each screen flash starts with a header. This contains a magic string, "PTP-RAT-CHUNK" followed by a sequence number. When the receiver is activated, it starts taking screenshots at twice the transmission frequency (the Nyquist rate). When it detects a valid header, it decodes the pixel colour information and waits on the next flash. As soon as a valid header is not detected, it reconstructs all the flashes and saves the result to a file. To transfer a file, you run an instance of the Rat locally on your hacktop, and set that up as a receiver. Another instance is run on the remote server and this acts as a sender. You simply click on send file, and select a file to send. The mouse pointer disappears and the screen begins to flash as the file is transmitted via the pixel colour values. At the end of the transfer, a file-save dialog appears on the receiver, and the file is saved. Full Article
cr Macs Framework 1.14f Cross Site Scripting / SQL Injection By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:33:28 GMT Macs Framework version 1.14f suffers from cross site scripting and remote SQL injection vulnerabilities. Full Article
cr Project Open CMS 5.0.3 Cross Site Scripting / SQL Injection By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:48:04 GMT Project Open CMS version 5.0.3 suffers from cross site scripting and remote SQL injection vulnerabilities. Full Article
cr hits script 1.0 SQL Injection By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:58:05 GMT hits script version 1.0 suffers from a remote SQL injection vulnerability. Full Article
cr Creative Zone SQL Injection By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:53:09 GMT Creative Zone suffers from a remote SQL injection vulnerability. Full Article
cr XBOX 360 Aurora 0.6b Default Credentials / FTP Bruteforcer By packetstormsecurity.com Published On :: Sun, 24 Dec 2017 00:33:33 GMT XBOX 360 Aurora version 0.6b default credential FTP bruteforcing script. Full Article
cr NTCrackPipe 1.0 Local Windows Account Cracker By packetstormsecurity.com Published On :: Fri, 23 Feb 2018 02:22:22 GMT NTCrackPipe is a basic local Windows account cracking tool. Full Article
cr RC4 Simple FILE Encryption / Decryption By packetstormsecurity.com Published On :: Thu, 05 Apr 2018 20:20:02 GMT Simple script to perform RC4 encryption / decryption. Full Article
cr XOR File Encryption / Decryption By packetstormsecurity.com Published On :: Tue, 10 Apr 2018 02:22:22 GMT Script to perform basic XOR file encryption / decryption. Full Article
cr NTCrackPipe 2.0 By packetstormsecurity.com Published On :: Wed, 12 Feb 2020 18:39:40 GMT NTCrackPipe is a basic local Windows account cracking tool. Full Article
cr Brain Hack Devices Must Be Scrutinized, Say Top Scientists By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:41:11 GMT Full Article headline hacker science
cr Pandemic Declared As COVID-19 Blazes Across Globe By packetstormsecurity.com Published On :: Thu, 12 Mar 2020 13:12:47 GMT Full Article headline government virus science
cr Whoops! Tiny Bug In NetBSD 6.0 Code Ruins SSH Crypto Keys By packetstormsecurity.com Published On :: Tue, 26 Mar 2013 15:15:25 GMT Full Article headline flaw bsd cryptography
cr Critical FreeBSD Bug Squashed By packetstormsecurity.com Published On :: Fri, 18 Mar 2016 15:38:27 GMT Full Article headline flaw bsd
cr Hyperthreading Under Scrutiny With New TLBleed Crypto Key Leak By packetstormsecurity.com Published On :: Tue, 26 Jun 2018 15:49:41 GMT Full Article headline flaw bsd cryptography
cr Police Force Denies Creating Child Hacker Poster By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 16:25:18 GMT Full Article headline hacker government britain
cr Look Who's Joined The Anti-Encryption Posse: Germany, Come On Down By packetstormsecurity.com Published On :: Fri, 16 Jun 2017 14:11:25 GMT Full Article headline government privacy usa britain germany backdoor cryptography
cr German Police Handed Hacking Powers To Bypass Encrypted Communications By packetstormsecurity.com Published On :: Sat, 24 Jun 2017 16:49:10 GMT Full Article headline government privacy phone germany spyware backdoor cryptography
cr German Hacker Offers Rare Look Inside Secretive World Of Julian Assange, WikiLeaks By packetstormsecurity.com Published On :: Thu, 18 Jan 2018 04:24:47 GMT Full Article headline hacker government britain data loss germany
cr Code-Cracking WW2 Bombe Operation Recreated At Bletchley By packetstormsecurity.com Published On :: Mon, 24 Sep 2018 23:34:48 GMT Full Article headline britain cyberwar germany science cryptography
cr Switzerland Files Criminal Complaint Over Crypto Spying Scandal By packetstormsecurity.com Published On :: Sun, 01 Mar 2020 15:40:28 GMT Full Article headline government privacy cyberwar germany spyware cryptography switzerland cia
cr After Paris, Encryption Will Be A Key Issue In The 2016 Race By packetstormsecurity.com Published On :: Tue, 17 Nov 2015 16:53:20 GMT Full Article headline government privacy usa france terror cryptography
cr France Warns Microsoft To Stop Snooping On Windows 10 Users By packetstormsecurity.com Published On :: Thu, 21 Jul 2016 15:17:33 GMT Full Article headline privacy microsoft spyware france
cr French, German Ministers Demand New Encryption Backdoor Law By packetstormsecurity.com Published On :: Thu, 25 Aug 2016 13:39:27 GMT Full Article headline privacy germany france backdoor cryptography
cr Germany, France Lobby Hard For Encryption Backdoors By packetstormsecurity.com Published On :: Tue, 28 Feb 2017 14:17:08 GMT Full Article headline government phone germany france backdoor cryptography
cr Team Macron Praised For Feeding Phishing Spies Duff Info By packetstormsecurity.com Published On :: Tue, 09 May 2017 00:45:07 GMT Full Article headline government russia fraud spyware france phish
cr France To Block Facebook's Libra Cryptocurrency In Europe By packetstormsecurity.com Published On :: Fri, 13 Sep 2019 14:35:56 GMT Full Article headline government bank fraud france facebook social cryptography
cr Avast Anti-Virus Local Credential Disclosure By packetstormsecurity.com Published On :: Sun, 10 Feb 2019 13:22:22 GMT Avast Anti-Virus versions prior to 19.1.2360 suffer from a local credential disclosure vulnerability. Full Article
cr Symantec Mobile Encryption For iPhone 2.1.0 Denial Of Service By packetstormsecurity.com Published On :: Mon, 03 Sep 2018 04:44:44 GMT Symantec Mobile Encryption for iPhone version 2.1.0 suffers from a denial of service vulnerability. Full Article