j TV Monitoring Service Is Fair Use, Judge Rules By packetstormsecurity.com Published On :: Fri, 12 Sep 2014 04:14:16 GMT Full Article headline government pirate
j uTorrent Users Urged To Upgrade To Mitigate Hijacking Flaw By packetstormsecurity.com Published On :: Fri, 23 Feb 2018 15:16:09 GMT Full Article headline flaw pirate
j jQuery html() Cross Site Scripting By packetstormsecurity.com Published On :: Sat, 25 Apr 2020 12:23:23 GMT jQuery versions prior to 3.5 suffer from an html() cross site scripting vulnerability. Full Article
j Russia Denies Role In Israeli Airport GPS Jamming By packetstormsecurity.com Published On :: Thu, 27 Jun 2019 14:09:18 GMT Full Article headline government russia cyberwar israel
j British Spooks Seize Tech From Snowden Journo's Boyfriend At Airport By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 15:00:14 GMT Full Article headline government privacy usa britain data loss brazil nsa
j Brazilian Judge Orders Another WhatsApp Block Over Message Encryption By packetstormsecurity.com Published On :: Wed, 20 Jul 2016 00:57:38 GMT Full Article headline government privacy spyware facebook brazil cryptography
j Phrack - Attacking JavaScript Engines By packetstormsecurity.com Published On :: Tue, 26 Sep 2017 03:33:33 GMT Phrack: Attacking JavaScript Engines: A case study of JavaScriptCore and CVE-2016-4622. Full Article
j .NET Instrumentation Via MSIL Bytecode Injection By packetstormsecurity.com Published On :: Fri, 12 Jan 2018 14:44:44 GMT Whitepaper from Phrack called .NET Instrumentation via MSIL bytecode injection. Full Article
j New Ransomware Doesn't Just Encrypt Data. It Also Meddles With Critical Infrastructure By packetstormsecurity.com Published On :: Tue, 04 Feb 2020 14:39:11 GMT Full Article headline malware scada cryptography
j Jolla Phone URI Spoofing By packetstormsecurity.com Published On :: Fri, 13 Mar 2015 17:26:48 GMT Jolla Phone with Sailfish OS versions 1.1.1.27 and below suffer from a telephone URI spoofing vulnerability. Full Article
j Juniper Secure Access Cross Site Scripting By packetstormsecurity.com Published On :: Sat, 06 Mar 2010 15:42:52 GMT Juniper Secure Access suffers from a cross site scripting vulnerability. SA Appliances running Juniper IVE OS 6.0 or higher are affected. Full Article
j Juniper SRX Critical Denial Of Service By packetstormsecurity.com Published On :: Thu, 01 Apr 2010 23:28:06 GMT The Juniper SRX suffers from a dual-homed swapfile overflow error that can cause denial of service conditions. Full Article
j Juniper SSL VPN Bypass / Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 09 Nov 2010 01:05:48 GMT This is a list of older cross site scripting and bypass vulnerabilities associated with older Juniper IVE releases. Full Article
j Juniper VPN Client rdesktop Click Hack By packetstormsecurity.com Published On :: Mon, 22 Nov 2010 12:43:33 GMT Juniper VPN client with remote desktop lets an attacking spawn Internet Explorer prior to authentication. Full Article
j Juniper Secure Access Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 23 Jul 2013 14:44:44 GMT Juniper Secure Access software suffers from a reflective cross site scripting vulnerability. Full Article
j Juniper JunOS 9.x Cross Site Scripting By packetstormsecurity.com Published On :: Wed, 24 Jul 2013 17:01:11 GMT Juniper JunOS version 9.x suffers from a html injection vulnerability that allows for cross site scripting attacks. Full Article
j Juniper SSG20 Denial Of Service By packetstormsecurity.com Published On :: Thu, 23 Jan 2014 00:22:22 GMT A special crafted ICMP ECHO REQUEST can cause a denial of service condition on the Juniper SSG20. Full Article
j Juniper Secure Access SSL VPN Privilege Escalation By packetstormsecurity.com Published On :: Sat, 22 Dec 2018 18:07:08 GMT Certain Secure Access SA Series SSL VPN products (originally developed by Juniper Networks but now sold and supported by Pulse Secure, LLC) allow privilege escalation, as demonstrated by Secure Access SSL VPN SA-4000 5.1R5 (build 9627) 4.2 Release (build 7631). This occurs because appropriate controls are not performed. Full Article
j Centreon 19.10-3.el7 SQL Injection By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:50:00 GMT This is a whitepaper tutorial that describes steps taken to identify post-authentication remote SQL injection vulnerabilities in Centreon version 19.10-3.el7. Full Article
j Packet Storm Exploit 2013-0811-1 - Oracle Java storeImageArray() Invalid Array Indexing Code Execution By packetstormsecurity.com Published On :: Mon, 12 Aug 2013 04:11:58 GMT Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
j Packet Storm Advisory 2013-0811-1 - Oracle Java storeImageArray() By packetstormsecurity.com Published On :: Mon, 12 Aug 2013 04:34:58 GMT Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was obtained through the Packet Storm Bug Bounty program. Full Article
j Packet Storm Exploit 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 02:59:49 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
j Packet Storm Advisory 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 03:12:44 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
j Java storeImageArray() Invalid Array Indexing By packetstormsecurity.com Published On :: Fri, 16 Aug 2013 23:52:40 GMT This Metasploit module abuses an Invalid Array Indexing Vulnerability on the static function storeImageArray() function in order to produce a memory corruption and finally escape the Java Sandbox. The vulnerability affects Java version 7u21 and earlier. The module, which doesn't bypass click2play, has been tested successfully on Java 7u21 on Windows and Linux systems. This was created based upon the Packet Storm Bug Bounty release for this issue. Full Article
j Packet Storm Exploit 2013-0819-1 - Oracle Java BytePackedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:28:12 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
j Packet Storm Advisory 2013-0819-1 - Oracle Java BytePackedRaster.verify() By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:33:00 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
j Packet Storm Exploit 2013-0827-1 - Oracle Java ByteComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:58:22 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
j Packet Storm Advisory 2013-0827-1 - Oracle Java ByteComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:59:52 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
j Packet Storm Exploit 2013-0917-1 - Oracle Java ShortComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:45:32 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
j Packet Storm Advisory 2013-0917-1 - Oracle Java ShortComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:50:06 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
j Asterisk Project Security Advisory - AST-2018-001 By packetstormsecurity.com Published On :: Wed, 21 Feb 2018 23:02:22 GMT Asterisk Project Security Advisory - The RTP support in Asterisk maintains its own registry of dynamic codecs and desired payload numbers. While an SDP negotiation may result in a codec using a different payload number these desired ones are still stored internally. When an RTP packet was received this registry would be consulted if the payload number was not found in the negotiated SDP. This registry was incorrectly consulted for all packets, even those which are dynamic. If the payload number resulted in a codec of a different type than the RTP stream (for example the payload number resulted in a video codec but the stream carried audio) a crash could occur if no stream of that type had been negotiated. This was due to the code incorrectly assuming that a stream of the type would always exist. Full Article
j Windows UAC Protection Bypass (Via Slui File Handler Hijack) By packetstormsecurity.com Published On :: Thu, 31 May 2018 20:50:19 GMT This Metasploit module will bypass UAC on Windows 8-10 by hijacking a special key in the Registry under the Current User hive, and inserting a custom command that will get invoked when any binary (.exe) application is launched. But slui.exe is an auto-elevated binary that is vulnerable to file handler hijacking. When we run slui.exe with changed Registry key (HKCU:SoftwareClassesexefileshellopencommand), it will run our custom command as Admin instead of slui.exe. The module modifies the registry in order for this exploit to work. The modification is reverted once the exploitation attempt has finished. The module does not require the architecture of the payload to match the OS. If specifying EXE::Custom your DLL should call ExitProcess() after starting the payload in a different process. Full Article
j VMware Host VMX Process COM Class Hijack Privilege Escalation By packetstormsecurity.com Published On :: Mon, 25 Mar 2019 16:02:25 GMT The VMX process (vmware-vmx.exe) process configures and hosts an instance of VM. As is common with desktop virtualization platforms the VM host usually has privileged access into the OS such as mapping physical memory which represents a security risk. To mitigate this the VMX process is created with an elevated integrity level by the authentication daemon (vmware-authd.exe) which runs at SYSTEM. This prevents a non-administrator user opening the process and abusing its elevated access. Unfortunately the process is created as the desktop user which results in the elevated process sharing resources such as COM registrations with the normal user who can modify the registry to force an arbitrary DLL to be loaded into the VMX process. Affects VMware Workstation Windows version 14.1.5 (on Windows 10). Also tested on VMware Player version 15. Full Article
j Furukawa Electric ConsciusMAP 2.8.1 Java Deserialization Remote Code Execution By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:40:45 GMT Furukawa Electric ConsciusMAP version 2.8.1 java deserialization remote code execution exploit. Full Article
j Jira 8.3.4 Information Disclosure By packetstormsecurity.com Published On :: Sun, 02 Feb 2020 09:32:22 GMT Jira version 8.3.4 suffers from a username enumeration information disclosure vulnerability. Full Article
j SmartClient 120 Information Disclosure / XML Injection / LFI / Code Execution By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:12:28 GMT SmartClient version 120 suffers from information disclosure, local file inclusion, remote file upload, and XML external entity injection vulnerabilities. Full Article
j Cisco M1070 Content Security Management Appliance IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:35:49 GMT Cisco M1070 Content Security Management Appliance IronPort remote host header injection exploit. Full Article
j Cisco C170 Email Security Appliance 10.0.3-003 IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:37:13 GMT Cisco C170 Email Security Appliance version 10.0.3-003 IronPort remote host header injection exploit. Full Article
j Cisco Email Security Virtual Appliance C100V IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:39:03 GMT Cisco Email Security Virtual Appliance C100V IronPort remote host header injection exploit. Full Article
j Cisco C690 Email Security Appliance 11.0.2-044 IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:39:48 GMT Cisco C690 Email Security Appliance version 11.0.2-044 IronPort remote host header injection exploit. Full Article
j Cisco Email Security Virtual Appliance C600V IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:44:02 GMT Cisco Email Security Virtual Appliance C600V IronPort remote host header injection exploit. Full Article
j Cisco Email Security Virtual Appliance C370 IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:44:50 GMT Cisco Email Security Virtual Appliance C370 IronPort remote host header injection exploit. Full Article
j Cisco IronPort C350 Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:45:50 GMT Cisco IronPort C350 remote host header injection exploit. Full Article
j Cisco Content Security Management Virtual Appliance M600V IronPort Header Injection By packetstormsecurity.com Published On :: Wed, 04 Sep 2019 14:09:14 GMT Cisco Content Security Management Virtual Appliance M600V IronPort remote host header injection exploit. Full Article
j Cisco Email Security Virtual Appliance C300V IronPort Header Injection By packetstormsecurity.com Published On :: Wed, 04 Sep 2019 14:10:34 GMT Cisco Email Security Virtual Appliance C300V IronPort remote host header injection exploit. Full Article
j Cisco Email Security Virtual Appliance C380 IronPort Header Injection By packetstormsecurity.com Published On :: Wed, 04 Sep 2019 14:11:18 GMT Cisco Email Security Virtual Appliance C380 IronPort remote host header injection exploit. Full Article
j Cisco DCNM JBoss 10.4 Credential Leakage By packetstormsecurity.com Published On :: Wed, 08 Jan 2020 16:35:15 GMT Cisco DCNM JBoss version 10.4 suffers from a credential leakage vulnerability. Full Article
j Cisco Data Center Network Manager 11.2.1 SQL Injection By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:48:08 GMT Cisco Data Center Network Manager version 11.2.1 suffers from a remote SQL injection vulnerability. Full Article
j Cisco Data Center Network Manager 11.2.1 Command Injection By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:51:21 GMT Cisco Data Center Network Manager version 11.2.1 remote command injection exploit. Full Article
j Asterisk Project Security Advisory - AST-2017-011 By packetstormsecurity.com Published On :: Wed, 08 Nov 2017 23:44:44 GMT Asterisk Project Security Advisory - A memory leak occurs when an Asterisk pjsip session object is created and that call gets rejected before the session itself is fully established. When this happens the session object never gets destroyed. Full Article