0 Red Hat Security Advisory 2020-1524-01 By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:10:47 GMT Red Hat Security Advisory 2020-1524-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
0 Red Hat Security Advisory 2020-1769-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:19:01 GMT Red Hat Security Advisory 2020-1769-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, information leakage, integer overflow, null pointer, out of bounds read, and use-after-free vulnerabilities. Full Article
0 Red Hat Security Advisory 2020-1966-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:56:45 GMT Red Hat Security Advisory 2020-1966-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
0 Deep Instinct Windows Agent 1.2.29.0 Unquoted Service Path By packetstormsecurity.com Published On :: Fri, 06 Mar 2020 15:02:22 GMT Deep Instinct Windows Agent version 1.2.29.0 suffers from an unquoted service path vulnerability. Full Article
0 CoronaBlue / SMBGhost Microsoft Windows 10 SMB 3.1.1 Proof Of Concept By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 13:33:36 GMT CoronaBlue aka SMBGhost proof of concept exploit for Microsoft Windows 10 (1903/1909) SMB version 3.1.1. This script connects to the target host, and compresses the authentication request with a bad offset field set in the transformation header, causing the decompresser to buffer overflow and crash the target. Full Article
0 Microsoft Windows 10 SMB 3.1.1 Local Privilege Escalation By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:38:04 GMT Microsoft Windows 10 SMB version 3.1.1 SMBGhost local privilege escalation exploit. Full Article
0 Mozilla's Firefox 70 Is Out: Privacy Reports Reveal Whose Cookies Are Tracking You By packetstormsecurity.com Published On :: Wed, 23 Oct 2019 18:24:33 GMT Full Article headline privacy spyware mozilla
0 Stegano 0.9.2 By packetstormsecurity.com Published On :: Thu, 04 Apr 2019 23:48:57 GMT Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information. Full Article
0 Stegano 0.9.3 By packetstormsecurity.com Published On :: Wed, 10 Apr 2019 15:18:03 GMT Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information. Full Article
0 OpenSSH 8.0p1 By packetstormsecurity.com Published On :: Thu, 18 Apr 2019 13:17:35 GMT This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups. Full Article
0 Stegano 0.9.4 By packetstormsecurity.com Published On :: Wed, 05 Jun 2019 23:02:22 GMT Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information. Full Article
0 Hyperion Runtime Encrypter 2.0 By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 18:41:35 GMT Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter". Full Article
0 Tinc Virtual Private Network Daemon 1.0.36 By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 16:04:57 GMT tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information. Full Article
0 SSLsplit 0.5.5 By packetstormsecurity.com Published On :: Fri, 30 Aug 2019 16:01:23 GMT SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted. SSLsplit is intended to be useful for network forensics and penetration testing. Full Article
0 GNU Privacy Guard 2.2.20 By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 15:59:41 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
0 Secunia Security Advisory 50313 By packetstormsecurity.com Published On :: Wed, 22 Aug 2012 06:23:11 GMT Secunia Security Advisory - A vulnerability has been reported in CuteSoft Cute Editor for ASP.NET, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
0 ASP-Nuke 2.0.7 Open Redirect By packetstormsecurity.com Published On :: Fri, 28 Mar 2014 11:11:11 GMT ASP-Nuke version 2.0.7 suffers from an open redirect vulnerability. Full Article
0 Telerik ASP.NET AJAX RadEditor Control 2014.1.403.35 XSS By packetstormsecurity.com Published On :: Thu, 25 Sep 2014 15:20:36 GMT Telerik ASP.NET AJAX RadEditor Control versions 2014.1.403.35 and 2009.3.1208.20 suffer from a persistent cross site scripting vulnerability. Full Article
0 CodeWarrior 0.3 By packetstormsecurity.com Published On :: Tue, 13 Sep 2016 03:33:33 GMT CodeWarrior is a manual code and static analysis tool. It has many modules, one for each common language like PHP, ASP, Ruby, C/C++, Java and Javascript. Each module has rules in raw text with parameters like description, type, reference, relevance and match (regex to detect pattern). You can also create your own rules. Full Article
0 ASP Gateway 1.0.0 Database Disclosure By packetstormsecurity.com Published On :: Mon, 31 Oct 2016 03:33:33 GMT ASP Gateway 1.0.0 suffers from a database disclosure vulnerability. Full Article
0 ASP.NET jVideo Kit 1.0 SQL Injection By packetstormsecurity.com Published On :: Thu, 24 May 2018 18:08:18 GMT ASP.NET jVideo Kit version 1.0 suffers from a remote SQL injection vulnerability. Full Article
0 LW-N605R Remote Code Execution By packetstormsecurity.com Published On :: Mon, 10 Sep 2018 20:22:22 GMT LW-N605R devices allow remote code execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases. Full Article
0 ZyXEL P-660HN-T1 V2 Missing Authentication / Password Disclosure By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:27:39 GMT The ZyXEL P-660HN-T1 V2 rpWLANRedirect.asp page is missing authentication and discloses an administrator password. Full Article
0 70% Of KPN Customers Used Their Default Password Permanently By packetstormsecurity.com Published On :: Fri, 06 Jul 2012 23:37:27 GMT Full Article headline phone password netherlands
0 Dutch MP Must Cough Up €750 For Hacking Into Medical Lab By packetstormsecurity.com Published On :: Tue, 19 Feb 2013 14:58:00 GMT Full Article headline hacker government data loss netherlands
0 Dutch Govt Says No To Backdoors, Slides $540k Into OpenSSL Without Breaking Eye Contact By packetstormsecurity.com Published On :: Tue, 05 Jan 2016 14:57:39 GMT Full Article headline government netherlands backdoor cryptography
0 Stolen Hard Drives Had Payroll Data For 29,000 Facebook Workers By packetstormsecurity.com Published On :: Fri, 13 Dec 2019 20:28:15 GMT Full Article headline privacy bank cybercrime data loss fraud facebook
0 ATM Skimmer Sentenced For Fleecing $400,000 Out Of US Banks By packetstormsecurity.com Published On :: Wed, 08 Jan 2020 16:25:59 GMT Full Article headline bank cybercrime fraud
0 Adobe Fixes Over 100 Vulnerabilities In Latest Security Patch Update By packetstormsecurity.com Published On :: Wed, 11 Jul 2018 15:19:56 GMT Full Article headline flaw adobe patch
0 New Dexphot Malware Infected More Than 80,000 Computers By packetstormsecurity.com Published On :: Tue, 26 Nov 2019 17:33:37 GMT Full Article headline malware microsoft
0 Over 350,000 Microsoft Exchange Servers Still Open To Flaw By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:36:12 GMT Full Article headline microsoft flaw patch
0 TOR Virtual Network Tunneling Tool 0.4.0.5 By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 10:11:11 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
0 TOR Virtual Network Tunneling Tool 0.4.1.5 By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:34:13 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
0 TOR Virtual Network Tunneling Tool 0.4.1.6 By packetstormsecurity.com Published On :: Thu, 19 Sep 2019 16:34:13 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
0 TOR Virtual Network Tunneling Tool 0.4.2.5 By packetstormsecurity.com Published On :: Tue, 10 Dec 2019 16:02:28 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
0 TOR Virtual Network Tunneling Tool 0.4.2.6 By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:46:25 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
0 TOR Virtual Network Tunneling Tool 0.4.2.7 By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:31:49 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
0 Russian Charged With Running $20 Million Card Fraud Scheme By packetstormsecurity.com Published On :: Wed, 13 Nov 2019 17:01:47 GMT Full Article headline bank usa russia cybercrime fraud
0 Stone Gets 40 Months And A Rebuke From Judge For Lying To Congress By packetstormsecurity.com Published On :: Fri, 21 Feb 2020 15:28:35 GMT Full Article headline government usa russia fraud
0 Hands-On With The IBM 5150, Thirty Years Later By packetstormsecurity.com Published On :: Fri, 12 Aug 2011 13:46:42 GMT Full Article headline ibm science
0 FBI Says Cybercrime Profits Reached $3.5 Billion In 2019 By packetstormsecurity.com Published On :: Wed, 12 Feb 2020 18:13:50 GMT Full Article headline cybercrime fraud fbi
0 ProficySCADA For iOS 5.0.25920 Denial Of Service By packetstormsecurity.com Published On :: Sun, 22 Mar 2020 14:22:22 GMT ProficySCADA for iOS version 5.0.25920 suffers from a denial of service vulnerability. Full Article
0 SuperBackup 2.0.5 Persistent Cross Site Scripting By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:29:35 GMT SuperBackup version 2.0.5 for iOS suffers from a persistent cross site scripting vulnerability. Full Article
0 Sky File 2.1.0 Cross Site Scripting / Directory Traversal By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:33:56 GMT Sky File version 2.1.0 for iOS suffers from cross site scripting and directory traversal vulnerabilities. Full Article
0 File Sharing And Chat 1.0 Denial Of Service By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:54:09 GMT File Sharing and Chat version 1.0 for iOS suffers from a denial of service vulnerability. Full Article
0 Secunia Security Advisory 29803 By packetstormsecurity.com Published On :: Tue, 15 Apr 2008 17:23:16 GMT Secunia Security Advisory - A vulnerability has been reported in MirBSD Korn Shell, which can be exploited by malicious, local users to gain escalated privileges. Full Article
0 Firefox Gets Patch For Critical 0-Day That's Being Actively Exploited By packetstormsecurity.com Published On :: Thu, 09 Jan 2020 14:56:59 GMT Full Article headline flaw patch mozilla firefox zero day
0 School ERP Pro 1.0 Arbitrary File Read By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:33:09 GMT School ERP Pro version 1.0 suffers from an arbitrary file read vulnerability. Full Article
0 GitLab 12.9.0 Arbitrary File Read By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:32:50 GMT GitLab version 12.9.0 suffers from an arbitrary file read vulnerability. Full Article
0 webTareas 2.0.p8 Arbitrary File Deletion By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:49:45 GMT webTareas version 2.0.p8 suffers from an arbitrary file deletion vulnerability. Full Article