3 CodeWarrior 0.3 By packetstormsecurity.com Published On :: Tue, 13 Sep 2016 03:33:33 GMT CodeWarrior is a manual code and static analysis tool. It has many modules, one for each common language like PHP, ASP, Ruby, C/C++, Java and Javascript. Each module has rules in raw text with parameters like description, type, reference, relevance and match (regex to detect pattern). You can also create your own rules. Full Article
3 Adobe Fixes 43 Critical Acrobat And Reader Flaws By packetstormsecurity.com Published On :: Tue, 12 Feb 2019 17:38:02 GMT Full Article headline flaw adobe patch
3 Microsoft To Employ California's Digital Privacy Law Nationwide By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 15:24:20 GMT Full Article headline privacy microsoft usa
3 Microsoft Fixes Exploited Privilege Escalation Flaw, 34 More Bugs By packetstormsecurity.com Published On :: Wed, 11 Dec 2019 16:44:06 GMT Full Article headline microsoft flaw patch
3 Windows Has A New Wormable Vulnerability, And There's No Patch In Sight By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 13:51:26 GMT Full Article headline microsoft flaw
3 Over 350,000 Microsoft Exchange Servers Still Open To Flaw By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:36:12 GMT Full Article headline microsoft flaw patch
3 Russia's Fancy Bear Hackers Attack Anti Doping Agencies By packetstormsecurity.com Published On :: Tue, 29 Oct 2019 13:48:05 GMT Full Article headline hacker government russia cyberwar spyware
3 Read Tim Morrison's NSC Impeachment Testimony By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:01:48 GMT Full Article headline government usa russia fraud
3 Google Corrects IBM's Security Math By packetstormsecurity.com Published On :: Tue, 31 Aug 2010 01:37:54 GMT Full Article ibm google
3 IBM Supercomputer Overtakes Fujitsu As World's Fastest By packetstormsecurity.com Published On :: Tue, 19 Jun 2012 01:33:45 GMT Full Article headline ibm usa science japan
3 US Debuts World's Fastest Computer By packetstormsecurity.com Published On :: Mon, 11 Jun 2018 14:56:39 GMT Full Article headline ibm usa science
3 FBI Says Cybercrime Profits Reached $3.5 Billion In 2019 By packetstormsecurity.com Published On :: Wed, 12 Feb 2020 18:13:50 GMT Full Article headline cybercrime fraud fbi
3 AirDisk Pro 5.5.3 Persistent Cross Site Scripting By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:39:20 GMT AirDisk Pro version 5.5.3 for iOS suffers from multiple persistent cross site scripting vulnerabilities. Full Article
3 Folder Lock 3.4.5 Cross Site Scripting By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 18:44:44 GMT Folder Lock version 3.4.5 for iOS suffers from multiple cross site scripting vulnerabilities. Full Article
3 Transfer Master 3.3 Denial Of Service By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:58:27 GMT Transfer Master version 3.3 for iOS suffers from a denial of service vulnerability. Full Article
3 Secunia Security Advisory 29803 By packetstormsecurity.com Published On :: Tue, 15 Apr 2008 17:23:16 GMT Secunia Security Advisory - A vulnerability has been reported in MirBSD Korn Shell, which can be exploited by malicious, local users to gain escalated privileges. Full Article
3 Mozilla Patches Eleven Vulnerabilities In Firefox 71 And ESR 68.3 By packetstormsecurity.com Published On :: Fri, 06 Dec 2019 16:13:49 GMT Full Article headline flaw patch mozilla firefox
3 Firefox Gets Patch For Critical 0-Day That's Being Actively Exploited By packetstormsecurity.com Published On :: Thu, 09 Jan 2020 14:56:59 GMT Full Article headline flaw patch mozilla firefox zero day
3 MPC Sharj 3.11.1 Arbitrary File Download By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:39:30 GMT MPC Sharj version 3.11.1 suffers from an arbitrary file download vulnerability. Full Article
3 Crypto Boffins: RSA Tokens Can Be Cracked In 13 Minutes By packetstormsecurity.com Published On :: Wed, 27 Jun 2012 14:21:22 GMT Full Article headline flaw science cryptography rsa
3 Quantum Processor's Prime Feat Raises Security Issues By packetstormsecurity.com Published On :: Wed, 29 Aug 2012 04:41:13 GMT Full Article headline flaw science rsa
3 Adi Shamir Couldn't Get US Visa To Attend RSA Conference Named For Him By packetstormsecurity.com Published On :: Wed, 06 Mar 2019 15:36:10 GMT Full Article headline government usa conference cryptography rsa
3 RSA Conference 2019: The Sky's The Limit For Satellite Hacks By packetstormsecurity.com Published On :: Thu, 07 Mar 2019 15:10:13 GMT Full Article headline hacker space conference rsa
3 McAfee Buys Stonesoft Security For $389m By packetstormsecurity.com Published On :: Tue, 07 May 2013 14:31:04 GMT Full Article headline mcafee
3 McAfee Uncovers 200 New Cyber Attacks Per Minute In 2013 By packetstormsecurity.com Published On :: Mon, 10 Mar 2014 15:12:39 GMT Full Article headline hacker malware cybercrime mcafee
3 John McAfee Announces He's Running For President By packetstormsecurity.com Published On :: Wed, 09 Sep 2015 05:35:06 GMT Full Article headline government usa mcafee
3 John McAfee Offers To Crack San Bernardino Shooter's iPhone By packetstormsecurity.com Published On :: Fri, 19 Feb 2016 01:27:07 GMT Full Article headline phone password apple mcafee fbi
3 John McAfee's Unhackable Bitcoin Wallet Is Hackable, Company Admits By packetstormsecurity.com Published On :: Fri, 31 Aug 2018 13:42:57 GMT Full Article headline flaw mcafee cryptography
3 Scapy Packet Manipulation Tool 2.4.3rc2 By packetstormsecurity.com Published On :: Tue, 02 Jul 2019 14:10:41 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
3 Scapy Packet Manipulation Tool 2.4.3rc3 By packetstormsecurity.com Published On :: Fri, 12 Jul 2019 11:58:46 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
3 Scapy Packet Manipulation Tool 2.4.3rc4 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:30:52 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
3 Scapy Packet Manipulation Tool 2.4.3 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:38:28 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
3 Wapiti Web Application Vulnerability Scanner 3.0.2 By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 23:59:02 GMT Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities. Full Article
3 TestSSL 3.0rc6 By packetstormsecurity.com Published On :: Wed, 11 Dec 2019 14:44:44 GMT testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets. Full Article
3 TestSSL 3.0 By packetstormsecurity.com Published On :: Fri, 24 Jan 2020 17:04:50 GMT testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets. Full Article
3 Wapiti Web Application Vulnerability Scanner 3.0.3 By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:41:20 GMT Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities. Full Article
3 Lulzbuster 1.3.2 By packetstormsecurity.com Published On :: Tue, 17 Mar 2020 13:18:24 GMT Lulzbuster is a very fast and smart web directory and file enumeration tool written in C. Full Article
3 Ubuntu Security Notice USN-4183-2 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:18 GMT Ubuntu Security Notice 4183-2 - USN-4183-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. This update addresses the issue. Various other issues were also addressed. Full Article
3 Ubuntu Security Notice USN-4185-3 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:24 GMT Ubuntu Security Notice 4185-3 - USN-4185-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. Also, the update introduced a regression that broke KVM guests where extended page tables are disabled or not supported. This update addresses both issues. Various other issues were also addressed. Full Article
3 Ubuntu Security Notice USN-4186-3 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:56:10 GMT Ubuntu Security Notice 4186-3 - USN-4186-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. This update addresses the issue. Various other issues were also addressed. Full Article
3 10Strike LANState 9.32 Host Check hostname Buffer Overflow By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:30:21 GMT 10Strike LANState version 9.32 on x86 Host Check hostname SEH buffer overflow exploit. Full Article
3 Debian Security Advisory 3417-1 By packetstormsecurity.com Published On :: Mon, 14 Dec 2015 16:40:50 GMT Debian Linux Security Advisory 3417-1 - Tibor Jager, Jorg Schwenk, and Juraj Somorovsky, from Horst Gortz Institute for IT Security, published a paper in ESORICS 2015 where they describe an invalid curve attack in Bouncy Castle Crypto, a Java library for cryptography. An attacker is able to recover private Elliptic Curve keys from different applications, for example, TLS servers. Full Article
3 XMB - eXtreme Message Board 1.9.11.13 Weak Crypto / Insecure Password Storage By packetstormsecurity.com Published On :: Sat, 23 Jan 2016 13:03:33 GMT XMB - eXtreme Message Board version 1.9.11.13 suffers from weak crypto and insecure password storage vulnerabilities. Full Article
3 Debian Security Advisory 3457-1 By packetstormsecurity.com Published On :: Thu, 28 Jan 2016 17:19:51 GMT Debian Linux Security Advisory 3457-1 - Multiple security issues have been found in Iceweasel, Debian's version buffer overflow may lead to the execution of arbitrary code. In addition the bundled NSS crypto library addresses the SLOTH attack on TLS 1.2. Full Article
3 Apple Security Advisory 2016-03-21-7 By packetstormsecurity.com Published On :: Tue, 22 Mar 2016 15:23:11 GMT Apple Security Advisory 2016-03-21-7 - OS X Server 5.1 is now available and addresses RC4 crypto weaknesses, file access, and information disclosure vulnerabilities. Full Article
3 RSA BSAFE Lenstra's Attack By packetstormsecurity.com Published On :: Mon, 11 Apr 2016 22:06:11 GMT RSA BSAFE Micro Edition Suite, Crypto-C Micro Edition, Crypto-J, and SSL-J contain a fix to address Lenstra's attack. RSA BSAFE Micro Edition Suite (MES) 4.1.5, RSA BSAFE Crypto-C Micro Edition (CCME) 4.1.3, RSA BSAFE Crypto-J 6.2.1, and RSA BSAFE SSL-J 6.2.1 are affected. Full Article
3 Ubuntu Security Notice USN-3199-3 By packetstormsecurity.com Published On :: Mon, 28 Aug 2017 21:11:00 GMT Ubuntu Security Notice 3199-3 - USN-3199-1 fixed a vulnerability in Python Crypto. This update provides the corresponding update for Ubuntu 12.04 ESM. A It was discovered that the ALGnew function in block_templace.c in the A Python Cryptography Toolkit contained a heap-based buffer overflow A vulnerability. A remote attacker could use this flaw to execute A arbitrary code by using a crafted initialization vector parameter. Various other issues were also addressed. Full Article
3 Debian Security Advisory 3967-1 By packetstormsecurity.com Published On :: Fri, 08 Sep 2017 13:34:00 GMT Debian Linux Security Advisory 3967-1 - An authentication bypass vulnerability was discovered in mbed TLS, a lightweight crypto and SSL/TLS library, when the authentication mode is configured as 'optional'. A remote attacker can take advantage of this flaw to mount a man-in-the-middle attack and impersonate an intended peer via an X.509 certificate chain with many intermediates. Full Article
3 Debian Security Advisory 4138-1 By packetstormsecurity.com Published On :: Thu, 15 Mar 2018 15:57:24 GMT Debian Linux Security Advisory 4138-1 - Several vulnerabilities were discovered in mbed TLS, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code. Full Article
3 Ubuntu Security Notice USN-3616-1 By packetstormsecurity.com Published On :: Tue, 03 Apr 2018 18:19:00 GMT Ubuntu Security Notice 3616-1 - It was discovered that Python Crypto incorrectly generated ElGamal key parameters. A remote attacker could possibly use this issue to obtain sensitive information. Full Article