x Pwn2Own Contest Yields 13 Bugs, As Virtual Format Expands Talent Pool By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:38 GMT Full Article headline hacker canada conference
x Gentoo Linux Security Advisory 202003-06 By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:58:36 GMT Gentoo Linux Security Advisory 202003-6 - Multiple vulnerabilities have been found in Ruby, the worst of which could lead to the remote execution of arbitrary code. Versions less than 2.4.9:2.4 are affected. Full Article
x Gentoo Linux Security Advisory 202003-09 By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:08:19 GMT Gentoo Linux Security Advisory 202003-9 - A vulnerability in OpenID library for Ruby at worst might allow an attacker to bypass authentication. Versions less than 2.9.2 are affected. Full Article
x Xcon2005_San.pdf By packetstormsecurity.com Published On :: Wed, 31 Aug 2005 10:17:25 GMT Xcon 2005: Hacking Windows CE Full Article
x SYMSA-2007-012.txt By packetstormsecurity.com Published On :: Tue, 23 Oct 2007 18:13:58 GMT Symantec Vulnerability Research SYMSA-2007-012 - Microsoft Windows CE suffers from a IGMP related denial of service vulnerability. Full Article
x Windows Mobile 6.5 MessageBox Shellcode By packetstormsecurity.com Published On :: Tue, 28 Sep 2010 01:53:25 GMT Windows Mobile version 6.5 TR (WinCE 5.2) MessageBox shellcode for ARM. Full Article
x Microsoft PowerPoint Viewer TextBytesAtom Stack Buffer Overflow By packetstormsecurity.com Published On :: Fri, 14 May 2010 14:44:02 GMT This Metasploit module exploits a stack buffer overflow vulnerability in the handling of the TextBytesAtom records by Microsoft PowerPoint Viewer. According to Microsoft, the PowerPoint Viewer distributed with Office 2003 SP3 and earlier, as well as Office 2004 for Mac, are vulnerable. NOTE: The vulnerable code path is not reachable on versions of Windows prior to Windows Vista. Full Article
x Windows Vista/7 lpksetup.exe DLL Hijacking By packetstormsecurity.com Published On :: Wed, 27 Oct 2010 01:49:35 GMT Microsoft Windows Vista/7 suffers from a DLL hijacking vulnerability in lpksetup.exe. Full Article
x Windows Vista/7 UAC Bypass Exploit By packetstormsecurity.com Published On :: Wed, 24 Nov 2010 22:52:18 GMT Microsoft Windows Vista / 7 privilege escalation exploit that has UAC bypass. Full Article
x Microsoft Windows Vista/Server 2008 nsiproxy.sys Denial Of Service By packetstormsecurity.com Published On :: Wed, 18 May 2011 09:09:09 GMT Microsoft Windows Vista/Server 2008 nsiproxy.sys local kernel denial of service exploit. Full Article
x DVD X Player 5.5 .plf PlayList Buffer Overflow By packetstormsecurity.com Published On :: Fri, 02 Sep 2011 15:22:44 GMT This Metasploit module exploits a stack-based buffer overflow on DVD X Player 5.5 Pro and Standard. By supplying a long string of data in a plf file (playlist), the MediaPlayerCtrl.dll component will attempt to extract a filename out of the string, and then copy it on the stack without any proper bounds checking, which causes a buffer overflow, and results arbitrary code execution under the context of the user. This Metasploit module has been designed to target common Windows systems such as: Windows XP SP2/SP3, Windows Vista, and Windows 7. Full Article
x Mandriva Linux Security Advisory 2012-081 By packetstormsecurity.com Published On :: Thu, 24 May 2012 15:20:53 GMT Mandriva Linux Security Advisory 2012-081 - Security issues were identified and fixed in mozilla firefox. Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Using the Address Sanitizer tool, security researcher Aki Helin from OUSPG found that IDBKeyRange of indexedDB remains in the XPConnect hashtable instead of being unlinked before being destroyed. Security research firm iDefense reported that researcher wushi of team509 discovered a memory corruption on Windows Vista and Windows 7 systems with hardware acceleration disabled or using incompatible video drivers. Various other issues have also been addressed. Full Article
x Internet Explorer Script Interjection Code Execution By packetstormsecurity.com Published On :: Fri, 17 Aug 2012 22:22:33 GMT The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur. Full Article
x Internet Explorer Script Interjection Code Execution By packetstormsecurity.com Published On :: Fri, 07 Sep 2012 03:22:50 GMT The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur. Full Article
x NTR ActiveX Control Check() Method Buffer Overflow By packetstormsecurity.com Published On :: Sat, 22 Sep 2012 06:44:12 GMT This Metasploit module exploits a vulnerability found in NTR ActiveX 1.1.8. The vulnerability exists in the Check() method, due to the insecure usage of strcat to build a URL using the bstrParams parameter contents, which leads to code execution under the context of the user visiting a malicious web page. In order to bypass DEP and ASLR on Windows Vista and Windows 7 JRE 6 is needed. Full Article
x HP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:19:31 GMT This Metasploit module exploits a vulnerability on the lrFileIOService ActiveX, as installed with HP LoadRunner 11.50. The vulnerability exists in the WriteFileString method, which allow the user to write arbitrary files. It's abused to drop a payload embedded in a dll, which is later loaded through the Init() method from the lrMdrvService control, by abusing an insecure LoadLibrary call. This Metasploit module has been tested successfully on IE8 on Windows XP. Virtualization based on the Low Integrity Process, on Windows Vista and 7, will stop this module because the DLL will be dropped to a virtualized folder, which isn't used by LoadLibrary. Full Article
x SolidWorks Workgroup PDM 2014 pdmwService.exe Arbitrary File Write By packetstormsecurity.com Published On :: Thu, 06 Mar 2014 03:15:49 GMT This Metasploit module exploits a remote arbitrary file write vulnerability in SolidWorks Workgroup PDM 2014 SP2 and prior. For targets running Windows Vista or newer the payload is written to the startup folder for all users and executed upon next user logon. For targets before Windows Vista code execution can be achieved by first uploading the payload as an exe file, and then upload another mof file, which schedules WMI to execute the uploaded payload. This Metasploit module has been tested successfully on SolidWorks Workgroup PDM 2011 SP0 on Windows XP SP3 (EN) and Windows 7 SP1 (EN). Full Article
x MS14-060 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Sat, 18 Oct 2014 00:42:31 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. Full Article
x MS14-064 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Thu, 13 Nov 2014 17:32:46 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly exploited in the wild as MS14-060 patch bypass. The Microsoft update tried to fix the vulnerability publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. And please keep in mind that some other setups such as using Office 2010 SP1 might be less stable, and sometimes may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
x MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python By packetstormsecurity.com Published On :: Fri, 14 Nov 2014 00:34:29 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, bypassing the patch MS14-060, for the vulnerability publicly known as "Sandworm", on systems with Python for Windows installed. Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. Please keep in mind that some other setups such as those using Office 2010 SP1 may be less stable, and may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
x HP Data Protector Encrypted Communication Remote Command Execution By packetstormsecurity.com Published On :: Tue, 07 Jun 2016 07:51:36 GMT This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2. Full Article
x GOP Canvassing App Credentials Exposed In Code Repository By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:09:13 GMT Full Article headline government privacy usa data loss
x 14 Million Key Ring Users Exposed In Open Database By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:25 GMT Full Article headline privacy database data loss
x Small Businesses Tapping COVID-19 Loans Hit With Data Exposure By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:05:07 GMT Full Article headline government privacy usa virus data loss
x Turkey Twitter Ban Is A Losing Battle, Expert Claims By packetstormsecurity.com Published On :: Mon, 24 Mar 2014 15:12:13 GMT Full Article headline government turkey twitter censorship
x Solaris 11.4 xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 15:03:23 GMT Solaris version 11.4 xscreensaver local privilege escalation exploit. Full Article
x Solaris xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 23 Oct 2019 20:15:30 GMT This Metasploit module exploits a vulnerability in xscreensaver versions since 5.06 on unpatched Solaris 11 systems which allows users to gain root privileges. xscreensaver allows users to create a user-owned file at any location on the filesystem using the -log command line argument introduced in version 5.06. This module uses xscreensaver to create a log file in /usr/lib/secure/, overwrites the log file with a shared object, and executes the shared object using the LD_PRELOAD environment variable. This module has been tested successfully on xscreensaver version 5.15 on Solaris 11.1 (x86) and xscreensaver version 5.15 on Solaris 11.3 (x86). Full Article
x Solaris xlock Information Disclosure By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:38:33 GMT A low impact information disclosure vulnerability in the setuid root xlock binary distributed with Solaris may allow local users to read partial contents of sensitive files. Due to the fact that target files must be in a very specific format, exploitation of this flaw to escalate privileges in a realistic scenario is unlikely. Full Article
x Oracle Solaris 11.x / 10 whodo / w Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:38:30 GMT A difficult to exploit heap-based buffer overflow in setuid root whodo and w binaries distributed with Solaris allows local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges. Full Article
x NetBSD-SA1999-012.vax.ptrace By packetstormsecurity.com Published On :: Thu, 23 Sep 1999 04:08:42 GMT NetBSD uses the ptrace(2) system call to trace and debug other processes. The debugging process can also modify the internal registers, including the status (PSL) register, for the process being debugged. Besides the normal user-accessible flags, the VAX hardware also stores information about privilege levels and used stacks in the PSL. Those flags are only altered via the instruction REI (return from interrupt) or LDPCTX (load process context) and cannot be modified while running in "user" mode. NetBSD security page here. Full Article
x systemx.txt By packetstormsecurity.com Published On :: Sat, 15 Apr 2000 05:30:57 GMT bt systemx switch administration and overview of bt telcom operations and maintanance centers, written for f41th magazine. the system is based on a vax/vms platform with multi-level oracle databases, a look into the man-machine interface of uk switching, and remote switch/node interfaces. Full Article
x vaxhack.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:20:43 GMT How to hack VAX's. Full Article
x vaxdeco.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:20:43 GMT A VAX decoy script to grab some accunts. Full Article
x cccvax.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:20:43 GMT Pretty complete file on hacking VAX/VMS machines Full Article
x psibrute.com.txt By packetstormsecurity.com Published On :: Sun, 17 Nov 2002 03:04:53 GMT This DCL script abuses the old psi_mail trick on VAX/VMS systems to remotely find valid users. Full Article
x SSRT4866.txt By packetstormsecurity.com Published On :: Thu, 03 Mar 2005 08:22:42 GMT HP Security Bulletin - A potential security vulnerability has been identified with HP OpenVMS VAX version 7.x and 6.x and OpenVMS Alpha Version 7.x or 6.x that may allow a local authorized user to gain unauthorized privileged access to data and system resources. Full Article
x Linux's systemd Vulnerable To DNS Server Attack By packetstormsecurity.com Published On :: Thu, 29 Jun 2017 14:03:10 GMT Full Article headline linux dns flaw
x Hacker's Hijack Security Firm Fox-IT's Domain By packetstormsecurity.com Published On :: Tue, 19 Dec 2017 14:21:52 GMT Full Article headline hacker dns
x MaMi Malware Targets Mac OS X DNS Settings By packetstormsecurity.com Published On :: Mon, 15 Jan 2018 15:56:32 GMT Full Article headline malware dns fraud apple
x Firefox Turns On Encrypted DNS By Default To Thwart Snooping ISPs By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:00:05 GMT Full Article headline privacy dns mozilla firefox cryptography
x Open-Xchange OX App Suite Content Spoofing / Cross Site Scripting By packetstormsecurity.com Published On :: Fri, 16 Aug 2019 21:17:15 GMT Open-Xchange OX App Suite suffers from a content spoofing, cross site scripting, and information disclosure vulnerabilities. Versions affected vary depending on the vulnerability. Full Article
x Zyxel USG/UAG/ATP/VPN/NXC External DNS Requests By packetstormsecurity.com Published On :: Fri, 30 Aug 2019 15:57:35 GMT Zyxel USG/UAG/ATP/VPN/NXC series suffer from an issue where a DNS request can be made by an unauthenticated attacker to either spam a DNS service of a third party with requests that have a spoofed origin or probe whether domain names are present on the internal network behind the firewall. Full Article
x Windows Defender Antivirus 4.18.1908.7-0 File Extension Spoofing By packetstormsecurity.com Published On :: Thu, 12 Dec 2019 13:42:41 GMT Windows Defender Antivirus version 4.18.1908.7-0 suffers from a file extension spoofing vulnerability. Full Article
x Gentoo Linux Security Advisory 202004-06 By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 02:51:49 GMT Gentoo Linux Security Advisory 202004-6 - A regression in GnuTLS breaks the security guarantees of the DTLS protocol. Versions less than 3.6.13 are affected. Full Article
x Rootstealer X11 Code Executor By packetstormsecurity.com Published On :: Sat, 10 Mar 2018 20:22:22 GMT Rootstealer is a program to detect when a linux user opens a terminal with root and it injects intrusive commands in the terminal with X11. Full Article
x Pisay Online E-Learning System 1.0 SQL Injection / Code Execution By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:40:34 GMT Pisay Online E-Learning System version 1.0 suffers from remote SQL Injection and code execution vulnerabilities. Full Article
x XBOX 360 Aurora 0.6b Default Credentials / FTP Bruteforcer By packetstormsecurity.com Published On :: Sun, 24 Dec 2017 00:33:33 GMT XBOX 360 Aurora version 0.6b default credential FTP bruteforcing script. Full Article
x XOR File Encryption / Decryption By packetstormsecurity.com Published On :: Tue, 10 Apr 2018 02:22:22 GMT Script to perform basic XOR file encryption / decryption. Full Article
x OpenBSD Forks, Prunes, Fixes OpenSSL By packetstormsecurity.com Published On :: Tue, 22 Apr 2014 15:09:34 GMT Full Article headline flaw bsd ssl cryptography
x Spam-Blasting Malware Infects Thousands Of Linux / FreeBSD Servers By packetstormsecurity.com Published On :: Fri, 01 May 2015 14:20:17 GMT Full Article headline malware linux spam bsd