mo Social Media Giants Warn Of AI Moderation Errors As Coronavirus Empties Offices By packetstormsecurity.com Published On :: Tue, 17 Mar 2020 13:06:52 GMT Full Article headline virus google facebook twitter
mo Windows Mobile 6.5 MessageBox Shellcode By packetstormsecurity.com Published On :: Tue, 28 Sep 2010 01:53:25 GMT Windows Mobile version 6.5 TR (WinCE 5.2) MessageBox shellcode for ARM. Full Article
mo HP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:19:31 GMT This Metasploit module exploits a vulnerability on the lrFileIOService ActiveX, as installed with HP LoadRunner 11.50. The vulnerability exists in the WriteFileString method, which allow the user to write arbitrary files. It's abused to drop a payload embedded in a dll, which is later loaded through the Init() method from the lrMdrvService control, by abusing an insecure LoadLibrary call. This Metasploit module has been tested successfully on IE8 on Windows XP. Virtualization based on the Low Integrity Process, on Windows Vista and 7, will stop this module because the DLL will be dropped to a virtualized folder, which isn't used by LoadLibrary. Full Article
mo HP Data Protector Encrypted Communication Remote Command Execution By packetstormsecurity.com Published On :: Tue, 07 Jun 2016 07:51:36 GMT This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2. Full Article
mo Zoom Remove Data-Mining LinkedIn Feature By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:22 GMT Full Article headline privacy data loss
mo Anonymous Pwns 74 Turkish Government Sites By packetstormsecurity.com Published On :: Fri, 08 Jul 2011 13:30:53 GMT Full Article headline government turkey anonymous
mo Trump's Syria Move Blindsides National Security Leaders By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 13:55:30 GMT Full Article headline government usa turkey terror syria
mo Common Desktop Environment 2.3.1 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:40:08 GMT A buffer overflow in the CheckMonitor() function in the Common Desktop Environment 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in a malicious .Xdefaults file. Note that Oracle Solaris CDE is based on the original CDE 1.x train, which is different from the CDE 2.x codebase that was later open sourced. Most notably, the vulnerable buffer in the Oracle Solaris CDE is stack-based, while in the open source version it is heap-based. Full Article
mo Common Desktop Environment 1.6 Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:34:40 GMT A buffer overflow in the _SanityCheck() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier allows local users to gain root privileges via a long calendar name or calendar owner passed to sdtcm_convert in a malicious calendar file. The open source version of CDE (based on the CDE 2.x codebase) is not affected, because it does not ship the vulnerable program. Versions 1.6 and below are affected. Full Article
mo Common Desktop Environment 2.3.1 / 1.6 libDtSvc Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:37:07 GMT A difficult to exploit stack-based buffer overflow in the _DtCreateDtDirs() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier may allow local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges via a long X11 display name. The vulnerable function is located in the libDtSvc library and can be reached by executing the setuid program dtsession. Versions 2.3.1 and below as well as 1.6 and earlier are affected. Full Article
mo modern11.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:21:13 GMT Modernz #11. VMS / VAX Full Article
mo Smart Thermometers Detect Large Fever Outbreak In Florida By packetstormsecurity.com Published On :: Tue, 24 Mar 2020 15:19:33 GMT Full Article headline government usa virus science
mo Morrisons Is To Blame For 100k Payroll Theft And Leak By packetstormsecurity.com Published On :: Sat, 09 Nov 2019 13:44:36 GMT Full Article headline hacker privacy britain data loss
mo National Lottery Sentry MBA Hacker Gets 9 Months In Jail By packetstormsecurity.com Published On :: Fri, 10 Jan 2020 15:30:48 GMT Full Article headline hacker britain cybercrime fraud
mo Spies Get To Keep Monitoring All Traffic At World's Biggest Internet Hub By packetstormsecurity.com Published On :: Fri, 01 Jun 2018 14:23:15 GMT Full Article headline government privacy germany spyware
mo Codebreaking Bombe Moves To Computer Museum By packetstormsecurity.com Published On :: Tue, 26 Jun 2018 15:50:02 GMT Full Article headline britain cyberwar germany cryptography
mo Pressure Mounts For Swiss Probe Into Spying Operation By packetstormsecurity.com Published On :: Thu, 13 Feb 2020 15:20:34 GMT Full Article headline government privacy usa phone germany spyware cryptography switzerland goverment
mo Anonymous Declares War On Islamic State By packetstormsecurity.com Published On :: Tue, 17 Nov 2015 16:53:26 GMT Full Article headline hacker france terror anonymous
mo Anonymous Leaks Paris Climate Summit Officials' Private Data By packetstormsecurity.com Published On :: Sat, 05 Dec 2015 02:08:03 GMT Full Article headline government data loss france anonymous
mo How France's TV5 Was Almost Destroyed By Russian Hackers By packetstormsecurity.com Published On :: Mon, 10 Oct 2016 15:02:19 GMT Full Article headline government russia cyberwar france
mo Transferable Remote 1.1 XSS / LFI / Command Injection By packetstormsecurity.com Published On :: Wed, 13 Feb 2013 03:00:01 GMT Transferable Remote version 1.1 for iPad and iPhone suffers from cross site scripting, remote command injection, and local file inclusion vulnerabilities. Full Article
mo Symantec Mobile Encryption For iPhone 2.1.0 Denial Of Service By packetstormsecurity.com Published On :: Mon, 03 Sep 2018 04:44:44 GMT Symantec Mobile Encryption for iPhone version 2.1.0 suffers from a denial of service vulnerability. Full Article
mo Video: Wikileaks Rears Its Head In Cohen Testimony Against Trump By packetstormsecurity.com Published On :: Thu, 28 Feb 2019 03:03:48 GMT Full Article headline government email usa britain russia data loss fraud
mo qdPM Remote Code Execution By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 22:43:25 GMT qdPM versions prior to 9.1 suffer from a remote shell upload vulnerability that allows for remote code execution. Full Article
mo Cacti 1.2.8 Unauthenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:42:06 GMT graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie if a guest user has the graph real-time privilege. Full Article
mo Centreon Poller Authenticated Remote Command Execution By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:30:58 GMT This Metasploit module exploits a flaw where an authenticated user with sufficient administrative rights to manage pollers can use this functionality to execute arbitrary commands remotely. Usually, the miscellaneous commands are used by the additional modules (to perform certain actions), by the scheduler for data processing, etc. This module uses this functionality to obtain a remote shell on the target. Full Article
mo IBM Data Risk Manager 2.0.3 Remote Code Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:12:14 GMT IBM Data Risk Manager (IDRM) contains three vulnerabilities that can be chained by an unauthenticated attacker to achieve remote code execution as root. The first is an unauthenticated bypass, followed by a command injection as the server user, and finally abuse of an insecure default password. This module exploits all three vulnerabilities, giving the attacker a root shell. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too. Full Article
mo Russia most diversified commodity economy for the fourth year By www.fdiintelligence.com Published On :: Thu, 15 Aug 2019 11:00:45 +0000 Russia remains fDi’s most diversified commodity economy, while second ranked Brazil has displaced Ukraine into third place. Cathy Mullan reports. Full Article
mo Outlaw Shellbot Infects Linux Servers To Mine For Monero By packetstormsecurity.com Published On :: Tue, 05 Feb 2019 15:02:47 GMT Full Article headline hacker malware linux botnet fraud cryptography
mo Linux Bug Opens Most VPNs To Hijacking By packetstormsecurity.com Published On :: Mon, 09 Dec 2019 15:12:01 GMT Full Article headline hacker privacy linux flaw cryptography
mo Webmin 1.900 Remote Command Execution By packetstormsecurity.com Published On :: Fri, 18 Jan 2019 14:44:44 GMT This Metasploit module exploits an arbitrary command execution vulnerability in Webmin versions 1.900 and below. Any user authorized to the "Java file manager" and "Upload and Download" fields, to execute arbitrary commands with root privileges. In addition, "Running Processes" field must be authorized to discover the directory to be uploaded. A vulnerable file can be printed on the original files of the Webmin application. The vulnerable file we are uploading should be integrated with the application. Therefore, a ".cgi" file with the vulnerability belong to webmin application should be used. The module has been tested successfully with Webmin version 1.900 over Debian 4.9.18. Full Article
mo devolo dLAN 550 duo+ 3.1.0-1 Starter Kit Remote Code Execution By packetstormsecurity.com Published On :: Tue, 05 Feb 2019 02:33:18 GMT devolo dLAN 550 duo+ version 3.1.0-1 suffers from a remote code execution vulnerability. The devolo firmware has what seems to be a 'hidden' services which can be enabled by authenticated attacker via the the htmlmgr CGI script. This allows the attacker to start services that are deprecated or discontinued and achieve remote arbitrary code execution with root privileges. Full Article
mo Sierra Wireless AirLink ES450 ACEManager upload.cgi Remote Code Execution By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 21:01:11 GMT An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability. Full Article
mo D-Link DIR-859 Unauthenticated Remote Command Execution By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 16:26:01 GMT D-Link DIR-859 Routers are vulnerable to OS command injection via the UPnP interface. The vulnerability exists in /gena.cgi (function genacgi_main() in /htdocs/cgibin), which is accessible without credentials. Full Article
mo Latvia highlights anti-money laundering efforts By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:17 +0000 FDI into Latvia has recovered in recent years as the Baltic state has implemented stricter anti-money laundering procedures. Latvian minister of economics Ralfs Nemiro talks to Alex Irwin-Hunt about the progress made. Full Article
mo Facebook Removes Foreign Interference Operations From Iran And Russia By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 14:43:12 GMT Full Article headline government privacy russia data loss fraud cyberwar facebook iran
mo Egypt attracts most food manufacturing FDI By www.fdiintelligence.com Published On :: Thu, 21 Nov 2019 09:08:31 +0000 Egypt became the ‘bread basket’ of Africa in 2018, attracting the largest number of foreign investments in food manufacturing. Full Article
mo Investors mobilise $40bn for African infrastructure By www.fdiintelligence.com Published On :: Thu, 21 Nov 2019 09:47:13 +0000 Twenty-five countries attracted high-ticket investment deals at the Africa Investment Forum Full Article
mo Will mobile phone penetration maintain African momentum? By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:20:18 +0000 Sub-Saharan Africa is the world’s fastest growing mobile phone market, but how can telecoms companies make the most of the huge opportunities the region provides? Full Article
mo Viewpoint: In emerging states, more investment isn’t enough By www.fdiintelligence.com Published On :: Mon, 20 Jan 2020 12:41:41 +0000 Emerging states must re-orientate their investment efforts to increasingly target those with an outsized social impact Full Article
mo A Crypto-Mining Botnet Has Been Hijacking MSSQL Servers For Almost Two Years By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 14:26:20 GMT Full Article headline hacker microsoft database fraud flaw cryptography
mo Hackers Target Remote Workers With Fake Zoom Downloader By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:16 GMT Full Article headline hacker privacy malware fraud
mo Blue Mockingbird Monero-Mining Campaign Exploits Web Apps By packetstormsecurity.com Published On :: Fri, 08 May 2020 14:23:17 GMT Full Article headline malware fraud cryptography
mo Bradford ‘most improved UK city for growth’ By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 12:38:06 +0000 Bradford has been rated as the most improved city by the Good Growth for Cities 2019 index, while Oxford remained the highest performing UK city. Full Article
mo Tokyo world’s most talked about city online By www.fdiintelligence.com Published On :: Mon, 27 Jan 2020 09:03:59 +0000 ING Media names Tokyo, New York, London and Paris as global super brands for digital visibility. Full Article
mo FDI screening moves to the fore as protectionism takes hold By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:26:58 +0000 Authorities in the US, the EU and across the developed world are stepping up efforts to scrutinise foreign investment on the grounds of both national security and tech sovereignty. Full Article
mo CEE ‘key for automotive R&D’ By www.fdiintelligence.com Published On :: Thu, 30 Jan 2020 16:28:39 +0000 Western European carmakers should consider an R&D footprint in CEE, says McKinsey. Full Article
mo Rhineland-Palatinate moves up a gear in investment attraction By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:18:17 +0000 From historically underperforming when compared with its peers, the German federal state of Rhineland-Palatinate is now attracting major investment projects on the back of its auto and electrification expertise. Full Article
mo Serbia's automotive companies drive inward investment By www.fdiintelligence.com Published On :: Thu, 13 Feb 2020 16:41:16 +0000 Foreign investment into Serbia is growing at a healthy pace thanks to its attractive automotive manufacturing industry and highly regarded free zones. Full Article
mo Baby Monitors Watched By Hackers, Warn Experts By packetstormsecurity.com Published On :: Tue, 03 Mar 2020 14:01:17 GMT Full Article headline hacker privacy flaw spyware