1 Red Hat Security Advisory 2020-1505-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:53:17 GMT Red Hat Security Advisory 2020-1505-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. An out-of-bounds heap access vulnerability was addressed. Full Article
1 Red Hat Security Advisory 2020-1524-01 By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:10:47 GMT Red Hat Security Advisory 2020-1524-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
1 Red Hat Security Advisory 2020-1769-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:19:01 GMT Red Hat Security Advisory 2020-1769-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, information leakage, integer overflow, null pointer, out of bounds read, and use-after-free vulnerabilities. Full Article
1 Red Hat Security Advisory 2020-1966-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:56:45 GMT Red Hat Security Advisory 2020-1966-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
1 OAIC Received 114 Voluntary Data Breach Notifications In Two Years By packetstormsecurity.com Published On :: Thu, 19 Oct 2017 14:16:59 GMT Full Article headline hacker privacy australia data loss
1 Police Bust Man For Selling 1 Million Netflix, Spotify Passwords By packetstormsecurity.com Published On :: Wed, 13 Mar 2019 14:20:00 GMT Full Article headline government australia cybercrime data loss fraud password
1 RFID-Hack Hits 1 Billion Digital Access Cards Worldwide By packetstormsecurity.com Published On :: Wed, 12 Mar 2008 21:57:33 GMT Full Article privacy rfid
1 Deep Instinct Windows Agent 1.2.29.0 Unquoted Service Path By packetstormsecurity.com Published On :: Fri, 06 Mar 2020 15:02:22 GMT Deep Instinct Windows Agent version 1.2.29.0 suffers from an unquoted service path vulnerability. Full Article
1 CoronaBlue / SMBGhost Microsoft Windows 10 SMB 3.1.1 Proof Of Concept By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 13:33:36 GMT CoronaBlue aka SMBGhost proof of concept exploit for Microsoft Windows 10 (1903/1909) SMB version 3.1.1. This script connects to the target host, and compresses the authentication request with a bad offset field set in the transformation header, causing the decompresser to buffer overflow and crash the target. Full Article
1 Microsoft Windows SMB 3.1.1 Remote Code Execution By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 13:39:33 GMT Microsoft Windows SMB version 3.1.1 suffers from a code execution vulnerability. Full Article
1 Microsoft Windows 10 SMB 3.1.1 Local Privilege Escalation By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:38:04 GMT Microsoft Windows 10 SMB version 3.1.1 SMBGhost local privilege escalation exploit. Full Article
1 OVP Website Falls To Multiple Hacker Attacks In 1 Day By packetstormsecurity.com Published On :: Fri, 22 Jul 2011 14:31:57 GMT Full Article headline hacker government philippines
1 GNU Privacy Guard 2.2.14 By packetstormsecurity.com Published On :: Tue, 19 Mar 2019 21:10:07 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
1 GNU Privacy Guard 2.2.15 By packetstormsecurity.com Published On :: Tue, 26 Mar 2019 15:17:20 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
1 OpenSSH 8.0p1 By packetstormsecurity.com Published On :: Thu, 18 Apr 2019 13:17:35 GMT This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups. Full Article
1 OpenSSL Toolkit 1.1.1c By packetstormsecurity.com Published On :: Tue, 28 May 2019 16:38:40 GMT OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. Full Article
1 GNU Privacy Guard 2.2.16 By packetstormsecurity.com Published On :: Tue, 28 May 2019 16:43:38 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
1 GNU Privacy Guard 2.2.17 By packetstormsecurity.com Published On :: Sat, 13 Jul 2019 03:33:33 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
1 Tinc Virtual Private Network Daemon 1.0.36 By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 16:04:57 GMT tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information. Full Article
1 OpenSSL Toolkit 1.1.1d By packetstormsecurity.com Published On :: Wed, 11 Sep 2019 14:06:41 GMT OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. Full Article
1 OpenSSH 8.1p1 By packetstormsecurity.com Published On :: Wed, 09 Oct 2019 14:12:55 GMT This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups. Full Article
1 GNU Privacy Guard 2.2.18 By packetstormsecurity.com Published On :: Tue, 26 Nov 2019 17:37:46 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
1 GNU Privacy Guard 2.2.19 By packetstormsecurity.com Published On :: Mon, 09 Dec 2019 16:08:45 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
1 OpenSSH 8.2p1 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 17:55:36 GMT This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups. Full Article
1 OpenSSL Toolkit 1.1.1e By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:23:24 GMT OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. Full Article
1 Secunia Security Advisory 50313 By packetstormsecurity.com Published On :: Wed, 22 Aug 2012 06:23:11 GMT Secunia Security Advisory - A vulnerability has been reported in CuteSoft Cute Editor for ASP.NET, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
1 DevExpress ASP.NET File Manager 13.2.8 Directory Traversal By packetstormsecurity.com Published On :: Thu, 05 Jun 2014 20:59:44 GMT DevExpress ASP.NET File Manager versions 10.2 through 13.2.8 suffer from a directory traversal vulnerability. Full Article
1 Telerik ASP.NET AJAX RadEditor Control 2014.1.403.35 XSS By packetstormsecurity.com Published On :: Thu, 25 Sep 2014 15:20:36 GMT Telerik ASP.NET AJAX RadEditor Control versions 2014.1.403.35 and 2009.3.1208.20 suffer from a persistent cross site scripting vulnerability. Full Article
1 ASP Forums 2.1 Database Disclosure By packetstormsecurity.com Published On :: Sat, 06 Feb 2016 09:02:22 GMT ASP Forums version 2.1 suffers from a database disclosure vulnerability. Full Article
1 ASP Gateway 1.0.0 Database Disclosure By packetstormsecurity.com Published On :: Mon, 31 Oct 2016 03:33:33 GMT ASP Gateway 1.0.0 suffers from a database disclosure vulnerability. Full Article
1 ASP.NET Core 5-RC1 HTTP Header Injection By packetstormsecurity.com Published On :: Fri, 23 Dec 2016 18:21:01 GMT ASP.NET Core version 5.-RC1 suffers from an HTTP header injection vulnerability. Full Article
1 ASP.NET jVideo Kit 1.0 SQL Injection By packetstormsecurity.com Published On :: Thu, 24 May 2018 18:08:18 GMT ASP.NET jVideo Kit version 1.0 suffers from a remote SQL injection vulnerability. Full Article
1 ZyXEL P-660HN-T1 V2 Missing Authentication / Password Disclosure By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:27:39 GMT The ZyXEL P-660HN-T1 V2 rpWLANRedirect.asp page is missing authentication and discloses an administrator password. Full Article
1 Nedbank Says 1.7 Million Affected By Breach By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 14:43:17 GMT Full Article headline hacker privacy bank cybercrime data loss fraud
1 Adobe Fixes Over 100 Vulnerabilities In Latest Security Patch Update By packetstormsecurity.com Published On :: Wed, 11 Jul 2018 15:19:56 GMT Full Article headline flaw adobe patch
1 Adobe Announces 25 Bug Fixes, 21 In Acrobat Products By packetstormsecurity.com Published On :: Wed, 11 Dec 2019 16:44:02 GMT Full Article headline flaw adobe patch
1 TOR Virtual Network Tunneling Tool 0.4.1.5 By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:34:13 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
1 TOR Virtual Network Tunneling Tool 0.4.1.6 By packetstormsecurity.com Published On :: Thu, 19 Sep 2019 16:34:13 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
1 Telnet Backdoor Opens More Than 1M IoT Radios To Hijack By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:41:20 GMT Full Article headline flaw backdoor
1 What The Checkra1n Jailbreak Means For iDevice Security By packetstormsecurity.com Published On :: Fri, 15 Nov 2019 16:11:22 GMT Full Article headline hacker malware phone flaw apple backdoor
1 Hands-On With The IBM 5150, Thirty Years Later By packetstormsecurity.com Published On :: Fri, 12 Aug 2011 13:46:42 GMT Full Article headline ibm science
1 FBI Says Cybercrime Profits Reached $3.5 Billion In 2019 By packetstormsecurity.com Published On :: Wed, 12 Feb 2020 18:13:50 GMT Full Article headline cybercrime fraud fbi
1 Sky File 2.1.0 Cross Site Scripting / Directory Traversal By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:33:56 GMT Sky File version 2.1.0 for iOS suffers from cross site scripting and directory traversal vulnerabilities. Full Article
1 File Sharing And Chat 1.0 Denial Of Service By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:54:09 GMT File Sharing and Chat version 1.0 for iOS suffers from a denial of service vulnerability. Full Article
1 Mozilla Patches Eleven Vulnerabilities In Firefox 71 And ESR 68.3 By packetstormsecurity.com Published On :: Fri, 06 Dec 2019 16:13:49 GMT Full Article headline flaw patch mozilla firefox
1 School ERP Pro 1.0 Arbitrary File Read By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:33:09 GMT School ERP Pro version 1.0 suffers from an arbitrary file read vulnerability. Full Article
1 Apache Shiro 1.2.4 Remote Code Execution By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 16:05:16 GMT This Metasploit module exploits a vulnerability that allows remote attackers to execute arbitrary code on vulnerable installations of Apache Shiro version 1.2.4. Full Article
1 GitLab 12.9.0 Arbitrary File Read By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:32:50 GMT GitLab version 12.9.0 suffers from an arbitrary file read vulnerability. Full Article
1 i-doit Open Source CMDB 1.14.1 Arbitrary File Deletion By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:33:53 GMT i-doit Open Source CMDB version 1.14.1 suffers from an arbitrary file deletion vulnerability. Full Article
1 MPC Sharj 3.11.1 Arbitrary File Download By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:39:30 GMT MPC Sharj version 3.11.1 suffers from an arbitrary file download vulnerability. Full Article