li Eight-Year Nortel Hacking Operation Again Shows Enterprise Vulnerabilities By packetstormsecurity.com Published On :: Fri, 17 Feb 2012 16:09:48 GMT Full Article headline hacker china flaw nortel
li ECLIPSEDWING 1.5.2 Windows 2000 / 2003 / XP MS08-67 SMB Exploit By packetstormsecurity.com Published On :: Sat, 15 Apr 2017 01:44:59 GMT ECLIPSEDWING exploits the SMB vulnerability patched by MS08-67. It affects Microsoft Windows 2000, 2003, and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity. Full Article
li Mandriva Linux Security Advisory 2004.146 By packetstormsecurity.com Published On :: Sun, 12 Dec 2004 18:24:27 GMT Mandrake Linux Security Update Advisory - SGI developers discovered a remote DoS (Denial of Service) condition in the NFS statd server. rpc.statd did not ignore the SIGPIPE signal which would cause it to shutdown if a misconfigured or malicious peer terminated the TCP connection prematurely. Full Article
li Mandriva Linux Security Advisory 2004.148 By packetstormsecurity.com Published On :: Thu, 30 Dec 2004 06:59:44 GMT Mandrake Linux Security Update Advisory - Herbert Xu discovered that iproute can accept spoofed messages sent via the kernel netlink interface by other users on the local machine. This could lead to a local Denial of Service attack. Full Article
li Mandriva Linux Security Advisory 2005.029 By packetstormsecurity.com Published On :: Sat, 05 Feb 2005 20:49:38 GMT Mandrake Linux Security Update Advisory - Javier Fernandez-Sanguino Pena discovered two vulnerabilities in scripts included with the vim editor. The two scripts, tcltags and vimspell.sh created temporary files in an insecure manner which could allow a malicious user to execute a symbolic link attack or to create, or overwrite, arbitrary files with the privileges of the user invoking the scripts. Full Article
li 93 Million Mexican Voters Have Had Their Information Compromised By packetstormsecurity.com Published On :: Mon, 25 Apr 2016 14:01:58 GMT Full Article headline government privacy data loss mexico
li A 'Hacker' Exposed A Drug Lord And Is Trying To Save His Own Life By packetstormsecurity.com Published On :: Thu, 18 May 2017 14:15:13 GMT Full Article headline government cyberwar mexico
li Mexico Spied On Journalists, Lawyers, And Activists By packetstormsecurity.com Published On :: Tue, 20 Jun 2017 14:28:01 GMT Full Article headline privacy phone spyware mexico
li How Hackers Pulled Off A $20 Million Bank Heist By packetstormsecurity.com Published On :: Mon, 18 Mar 2019 14:48:17 GMT Full Article headline hacker bank cybercrime korea mexico
li Hacker Dumps Thousands Of Sensitive Mexican Embassy Documents Online By packetstormsecurity.com Published On :: Sun, 21 Apr 2019 15:59:17 GMT Full Article headline hacker government privacy data loss mexico
li Exploit Web 2.0, Real Life XSS-Worm By packetstormsecurity.com Published On :: Thu, 05 Feb 2009 22:08:04 GMT Whitepaper called Exploiting Web 2.0, Real Life XSS-Worm. Full Article
li Using ShoutBoxes To Control Malicious Software By packetstormsecurity.com Published On :: Tue, 14 Apr 2009 23:17:50 GMT Whitepaper called Using "ShoutBoxes" to control malicious software. Full Article
li LPRng use_syslog Remote Format String Vulnerability By packetstormsecurity.com Published On :: Wed, 17 Feb 2010 23:45:41 GMT This Metasploit module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin". Full Article
li Linksys E-Series Remote Code Execution By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 03:33:33 GMT Linksys E-Series unauthenticated remote command execution exploit that leverages the same vulnerability as used in the "Moon" worm. Full Article
li Linksys Worm Remote Root By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 20:02:22 GMT Proof of concept exploit used by the recent Linksys worm (known as "Moon"). Exploits blind command injection in tmUnblock.cgi. Full Article
li Linksys E-Series TheMoon Remote Command Injection By packetstormsecurity.com Published On :: Sat, 05 Apr 2014 03:11:21 GMT Some Linksys E-Series Routers are vulnerable to an unauthenticated OS command injection. This vulnerability was used from the so called "TheMoon" worm. There are many Linksys systems that might be vulnerable including E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900. This Metasploit module was tested successfully against an E1500 v1.0.5. Full Article
li Linux Security Checklist Tool 2.0.3 By packetstormsecurity.com Published On :: Thu, 03 Feb 2011 15:31:32 GMT Linux Security Checklist is a perl script that audits a given Linux host and provides recommendations for security enhancements. Full Article
li CA-92:04.ATT.rexecd.vulnerability By packetstormsecurity.com Published On :: Tue, 14 Sep 1999 05:47:01 GMT A vulnerability is present in AT&T TCP/IP Release 4.0 running on SVR4 systems for both the 386/486 and 3B2 RISC platforms. The problem is in the remote execution server /usr/etc/rexecd and a new version of rexecd is available from AT&T. Full Article
li Opera Users Baffled By Vulnerability Warnings By packetstormsecurity.com Published On :: Tue, 09 Mar 2010 04:55:46 GMT Full Article opera
li Opera Fixes Critical Form-Handling Flaw By packetstormsecurity.com Published On :: Fri, 28 Jan 2011 16:43:24 GMT Full Article headline opera
li Firefox, Opera Allow Crooks To Hide An Entire Phish Site In A Link By packetstormsecurity.com Published On :: Tue, 04 Sep 2012 15:05:05 GMT Full Article headline flaw opera phish firefox
li Kalimba.zip By packetstormsecurity.com Published On :: Sun, 02 Jan 2005 20:56:47 GMT Win32 based wardialer called Kalimba. Included Blue Box capabilities, such as 0 - 9 dialing, quarter, dime, nickel tones, Operator tones, conference capabilities. Source included. Full Article
li Asif Ali Zardari Website Hacker Nabbed By packetstormsecurity.com Published On :: Mon, 06 Dec 2010 23:45:14 GMT Full Article headline pakistan
li CIA Contractor Released After Pakistan Killings By packetstormsecurity.com Published On :: Wed, 16 Mar 2011 14:21:32 GMT Full Article headline government usa pakistan cia
li Pakistan Briefly Lifts Block On YouTube By packetstormsecurity.com Published On :: Mon, 31 Dec 2012 16:53:43 GMT Full Article headline government google pakistan censorship
li Deep Inside The CIA's Targeted Killings By packetstormsecurity.com Published On :: Wed, 10 Apr 2013 02:18:37 GMT Full Article headline government usa pakistan terror cia
li Pakistan Military Hit By Operation Shaheen Malware By packetstormsecurity.com Published On :: Tue, 13 Nov 2018 16:43:38 GMT Full Article headline government malware cyberwar pakistan
li Interweb Chuck Norris Infiltrates Netflix, Tivo By packetstormsecurity.com Published On :: Fri, 27 Mar 2009 10:33:28 GMT Full Article csrf
li Researchers Compromise Netflix Content In Widevine DRM Hack By packetstormsecurity.com Published On :: Wed, 01 May 2019 14:26:33 GMT Full Article headline flaw mpaa cryptography
li Feds Bust Man Selling $1.2m In Counterfeit Microsoft Software By packetstormsecurity.com Published On :: Sat, 10 Nov 2012 02:52:47 GMT Full Article headline microsoft cybercrime fraud ebay
li eBay ProStores Suffered From Full Credit Card Disclosure Vulnerability By packetstormsecurity.com Published On :: Wed, 02 Apr 2014 02:27:15 GMT Full Article headline privacy bank cybercrime data loss fraud ebay
li Massive Vulnerability Discovered In eBay's Magento By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 02:57:43 GMT Full Article headline cybercrime fraud flaw ebay
li eBay Year-Long Patch Stall A Little XSSive By packetstormsecurity.com Published On :: Thu, 30 Apr 2015 13:57:01 GMT Full Article headline flaw ebay
li Tech Giants Spend Millions To Stop Another Heartbleed By packetstormsecurity.com Published On :: Fri, 25 Apr 2014 14:55:37 GMT Full Article headline microsoft flaw google ssl facebook cryptography
li Mandriva Linux Security Advisory 2015-046 By packetstormsecurity.com Published On :: Thu, 12 Feb 2015 16:45:56 GMT Mandriva Linux Security Advisory 2015-046 - Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. Full Article
li Mandriva Linux Security Advisory 2015-140 By packetstormsecurity.com Published On :: Mon, 30 Mar 2015 21:48:37 GMT Mandriva Linux Security Advisory 2015-140 - If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. A remote unauthenticated attacker may craft special packets that trigger buffer overflows in the ntpd functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure(). The resulting buffer overflows may be exploited to allow arbitrary malicious code to be executed with the privilege of the ntpd process. A section of code in ntpd handling a rare error is missing a return statement, therefore processing did not stop when the error was encountered. This situation may be exploitable by an attacker. Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. The ntp package has been patched to fix these issues. Full Article
li Libya's Internet Goes Dark As Upheaval Spreads By packetstormsecurity.com Published On :: Sat, 05 Mar 2011 01:54:34 GMT Full Article headline government libya
li Libyans Will Fight No-Fly Zone By packetstormsecurity.com Published On :: Wed, 09 Mar 2011 15:22:38 GMT Full Article headline government libya
li Secret Libya Psyops, Caught By Online Sleuths By packetstormsecurity.com Published On :: Mon, 21 Mar 2011 15:27:04 GMT Full Article headline government usa libya
li The Robot War Over Libya Has Begun By packetstormsecurity.com Published On :: Fri, 22 Apr 2011 00:37:03 GMT Full Article headline libya
li Rebel Hackers Seize Libyan Domain Name Registry By packetstormsecurity.com Published On :: Mon, 22 Aug 2011 14:05:57 GMT Full Article headline hacker libya
li Libyan Rebels Are Flying Their Own Minidrone By packetstormsecurity.com Published On :: Wed, 24 Aug 2011 02:20:49 GMT Full Article headline libya
li Satellite Photos Take You Inside Gadhafi's Compound By packetstormsecurity.com Published On :: Sat, 27 Aug 2011 14:03:12 GMT Full Article headline libya
li US Military Debated Hacking Libyan Air Defenses By packetstormsecurity.com Published On :: Mon, 17 Oct 2011 22:46:50 GMT Full Article headline government usa cyberwar libya
li Gaddafi Death Reports Likely To Spawn Multiple Scams By packetstormsecurity.com Published On :: Thu, 20 Oct 2011 23:22:09 GMT Full Article headline scam libya
li Libya's New Rulers Fire Up Gaddafi's Surveillance Tech By packetstormsecurity.com Published On :: Fri, 06 Jul 2012 13:55:09 GMT Full Article headline government privacy science libya
li Intelligence Official Offers New Timeline For Benghazi Attack By packetstormsecurity.com Published On :: Fri, 02 Nov 2012 04:10:00 GMT Full Article headline government usa terror libya
li Pentagon Cyberwarriors Hit Iraq with Unsolicited Bulk Email By packetstormsecurity.com Published On :: Mon, 03 Mar 2003 05:00:55 GMT Full Article government email cyberwar iraq
li US Marine Unearths Nukes, Cocaine, And $25 Million By packetstormsecurity.com Published On :: Mon, 04 Sep 2006 22:16:23 GMT Full Article usa iraq
li Unpublished Iraq War Logs Trigger Internal WikiLeaks Revolt By packetstormsecurity.com Published On :: Mon, 27 Sep 2010 12:44:02 GMT Full Article iraq