2 Hyperion Runtime Encrypter 2.0 By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 18:41:35 GMT Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter". Full Article
2 GNU Privacy Guard 2.2.17 By packetstormsecurity.com Published On :: Sat, 13 Jul 2019 03:33:33 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
2 cryptmount Filesystem Manager 5.3.2 By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:37:05 GMT cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up. Full Article
2 GNU Privacy Guard 2.2.18 By packetstormsecurity.com Published On :: Tue, 26 Nov 2019 17:37:46 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
2 GNU Privacy Guard 2.2.19 By packetstormsecurity.com Published On :: Mon, 09 Dec 2019 16:08:45 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
2 OpenSSH 8.2p1 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 17:55:36 GMT This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups. Full Article
2 GNU Privacy Guard 2.2.20 By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 15:59:41 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
2 Hyperion Runtime Encrypter 2.3 By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 20:32:22 GMT Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter". Full Article
2 FCKEditor 2.6.8 ASP File Upload Protection Bypass By packetstormsecurity.com Published On :: Wed, 28 Nov 2012 01:33:11 GMT FCKEditor version 2.6.8 ASP version suffers from a file upload protection bypass. Full Article
2 ASP-Nuke 2.0.7 Open Redirect By packetstormsecurity.com Published On :: Fri, 28 Mar 2014 11:11:11 GMT ASP-Nuke version 2.0.7 suffers from an open redirect vulnerability. Full Article
2 DevExpress ASP.NET File Manager 13.2.8 Directory Traversal By packetstormsecurity.com Published On :: Thu, 05 Jun 2014 20:59:44 GMT DevExpress ASP.NET File Manager versions 10.2 through 13.2.8 suffer from a directory traversal vulnerability. Full Article
2 Telerik ASP.NET AJAX RadEditor Control 2014.1.403.35 XSS By packetstormsecurity.com Published On :: Thu, 25 Sep 2014 15:20:36 GMT Telerik ASP.NET AJAX RadEditor Control versions 2014.1.403.35 and 2009.3.1208.20 suffer from a persistent cross site scripting vulnerability. Full Article
2 ASP Dynamika 2.5 File Upload / SQL Injection By packetstormsecurity.com Published On :: Mon, 07 Dec 2015 01:11:11 GMT ASP Dynamika version 2.5 suffers from arbitrary file upload and remote SQL injection vulnerabilities. Full Article
2 ASP Dynamika 2.5 Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 08 Dec 2015 22:42:39 GMT ASP Dynamika version 2.5 suffers from a cross site scripting vulnerability. Full Article
2 ASP Forums 2.1 Database Disclosure By packetstormsecurity.com Published On :: Sat, 06 Feb 2016 09:02:22 GMT ASP Forums version 2.1 suffers from a database disclosure vulnerability. Full Article
2 ZyXEL P-660HN-T1 V2 Missing Authentication / Password Disclosure By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:27:39 GMT The ZyXEL P-660HN-T1 V2 rpWLANRedirect.asp page is missing authentication and discloses an administrator password. Full Article
2 Stolen Hard Drives Had Payroll Data For 29,000 Facebook Workers By packetstormsecurity.com Published On :: Fri, 13 Dec 2019 20:28:15 GMT Full Article headline privacy bank cybercrime data loss fraud facebook
2 Adobe Announces 25 Bug Fixes, 21 In Acrobat Products By packetstormsecurity.com Published On :: Wed, 11 Dec 2019 16:44:02 GMT Full Article headline flaw adobe patch
2 TOR Virtual Network Tunneling Tool 0.4.2.5 By packetstormsecurity.com Published On :: Tue, 10 Dec 2019 16:02:28 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
2 TOR Virtual Network Tunneling Tool 0.4.2.6 By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:46:25 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
2 TOR Virtual Network Tunneling Tool 0.4.2.7 By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:31:49 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
2 Russian Charged With Running $20 Million Card Fraud Scheme By packetstormsecurity.com Published On :: Wed, 13 Nov 2019 17:01:47 GMT Full Article headline bank usa russia cybercrime fraud
2 IBM PC Pioneer William C Lowe Dies, Aged 72 By packetstormsecurity.com Published On :: Tue, 29 Oct 2013 15:14:00 GMT Full Article headline ibm science
2 FBI Says Cybercrime Profits Reached $3.5 Billion In 2019 By packetstormsecurity.com Published On :: Wed, 12 Feb 2020 18:13:50 GMT Full Article headline cybercrime fraud fbi
2 macOS/iOS IOAccelCommandQueue2::processSegmentKernelCommand() Out-Of-Bounds Timestamp Write By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 16:10:06 GMT macOS and iOS suffers from an out-of-bounds timestamp write in IOAccelCommandQueue2::processSegmentKernelCommand(). Full Article
2 ProficySCADA For iOS 5.0.25920 Denial Of Service By packetstormsecurity.com Published On :: Sun, 22 Mar 2020 14:22:22 GMT ProficySCADA for iOS version 5.0.25920 suffers from a denial of service vulnerability. Full Article
2 SuperBackup 2.0.5 Persistent Cross Site Scripting By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:29:35 GMT SuperBackup version 2.0.5 for iOS suffers from a persistent cross site scripting vulnerability. Full Article
2 Sky File 2.1.0 Cross Site Scripting / Directory Traversal By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:33:56 GMT Sky File version 2.1.0 for iOS suffers from cross site scripting and directory traversal vulnerabilities. Full Article
2 Secunia Security Advisory 29803 By packetstormsecurity.com Published On :: Tue, 15 Apr 2008 17:23:16 GMT Secunia Security Advisory - A vulnerability has been reported in MirBSD Korn Shell, which can be exploited by malicious, local users to gain escalated privileges. Full Article
2 Apache Shiro 1.2.4 Remote Code Execution By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 16:05:16 GMT This Metasploit module exploits a vulnerability that allows remote attackers to execute arbitrary code on vulnerable installations of Apache Shiro version 1.2.4. Full Article
2 GitLab 12.9.0 Arbitrary File Read By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:32:50 GMT GitLab version 12.9.0 suffers from an arbitrary file read vulnerability. Full Article
2 webTareas 2.0.p8 Arbitrary File Deletion By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:49:45 GMT webTareas version 2.0.p8 suffers from an arbitrary file deletion vulnerability. Full Article
2 RSA 2014 Security Conference App Has Severe Vulnerabilities By packetstormsecurity.com Published On :: Fri, 28 Feb 2014 16:05:23 GMT Full Article headline privacy data loss flaw conference rsa
2 RSA Conference 2019: The Sky's The Limit For Satellite Hacks By packetstormsecurity.com Published On :: Thu, 07 Mar 2019 15:10:13 GMT Full Article headline hacker space conference rsa
2 One In Every 172 Active RSA Certificates Are Vulnerable To Attack By packetstormsecurity.com Published On :: Mon, 16 Dec 2019 15:17:53 GMT Full Article headline privacy flaw cryptography rsa
2 McAfee Uncovers 200 New Cyber Attacks Per Minute In 2013 By packetstormsecurity.com Published On :: Mon, 10 Mar 2014 15:12:39 GMT Full Article headline hacker malware cybercrime mcafee
2 John McAfee Found Liable For 2012 Death Of Belize Neighbor By packetstormsecurity.com Published On :: Fri, 16 Nov 2018 15:27:55 GMT Full Article headline mcafee
2 Lynis Auditing Tool 2.7.5 By packetstormsecurity.com Published On :: Mon, 24 Jun 2019 23:28:32 GMT Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems. Full Article
2 Scapy Packet Manipulation Tool 2.4.3rc2 By packetstormsecurity.com Published On :: Tue, 02 Jul 2019 14:10:41 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
2 Scapy Packet Manipulation Tool 2.4.3rc3 By packetstormsecurity.com Published On :: Fri, 12 Jul 2019 11:58:46 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
2 Scapy Packet Manipulation Tool 2.4.3rc4 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:30:52 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
2 Scapy Packet Manipulation Tool 2.4.3 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:38:28 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
2 Wapiti Web Application Vulnerability Scanner 3.0.2 By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 23:59:02 GMT Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities. Full Article
2 XSSer Penetration Testing Tool 1.8-2 By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:16:36 GMT XSSer is an open source penetration testing tool that automates the process of detecting and exploiting XSS injections against different applications. It contains several options to try to bypass certain filters, and various special techniques of code injection. Full Article
2 Lulzbuster 1.2.0 By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 10:11:11 GMT Lulzbuster is a very fast and smart web directory and file enumeration tool written in C. Full Article
2 Lulzbuster 1.3.2 By packetstormsecurity.com Published On :: Tue, 17 Mar 2020 13:18:24 GMT Lulzbuster is a very fast and smart web directory and file enumeration tool written in C. Full Article
2 Linux/x86 Reverse Shell NULL Free 127.0.0.1:4444 Shellcode By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 14:50:43 GMT 91 bytes small Linux/x86 reverse shell NULL free 127.0.0.1:4444 shellcode. Full Article
2 Ubuntu Security Notice USN-4184-2 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:13 GMT Ubuntu Security Notice 4184-2 - USN-4184-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. Also, the update introduced a regression that broke KVM guests where extended page tables are disabled or not supported. This update addresses both issues. Various other issues were also addressed. Full Article
2 Ubuntu Security Notice USN-4183-2 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:18 GMT Ubuntu Security Notice 4183-2 - USN-4183-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. This update addresses the issue. Various other issues were also addressed. Full Article
2 10Strike LANState 9.32 Host Check hostname Buffer Overflow By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:30:21 GMT 10Strike LANState version 9.32 on x86 Host Check hostname SEH buffer overflow exploit. Full Article