3 Ubuntu Security Notice USN-3616-2 By packetstormsecurity.com Published On :: Mon, 09 Apr 2018 16:41:45 GMT Ubuntu Security Notice 3616-2 - USN-3616-1 fixed a vulnerability in Python Crypto. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that Python Crypto incorrectly generated ElGamal key parameters. A remote attacker could possibly use this issue to obtain sensitive information. Various other issues were also addressed. Full Article
3 Ubuntu Security Notice USN-3727-1 By packetstormsecurity.com Published On :: Wed, 01 Aug 2018 18:32:00 GMT Ubuntu Security Notice 3727-1 - It was discovered that Bouncy Castle incorrectly handled certain crypto algorithms. A remote attacker could possibly use these issues to obtain sensitive information, including private keys. Full Article
3 Ubuntu Security Notice USN-3901-1 By packetstormsecurity.com Published On :: Wed, 06 Mar 2019 18:08:40 GMT Ubuntu Security Notice 3901-1 - Jann Horn discovered that the userfaultd implementation in the Linux kernel did not properly restrict access to certain ioctls. A local attacker could use this possibly to modify files. It was discovered that the crypto subsystem of the Linux kernel leaked uninitialized memory to user space in some situations. A local attacker could use this to expose sensitive information. Various other issues were also addressed. Full Article
3 Facebook's Sir Nick Clegg Criticized Over WhatsApp Security By packetstormsecurity.com Published On :: Fri, 24 Jan 2020 16:52:25 GMT Full Article headline hacker privacy flaw facebook cryptography
3 Facebook's New Privacy Tool Lets You Manage How You're Tracked By packetstormsecurity.com Published On :: Tue, 28 Jan 2020 15:39:48 GMT Full Article headline privacy facebook social
3 Flaws In WhatsApp's Desktop App Allowed Remote Access To Files By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 17:05:28 GMT Full Article headline privacy data loss flaw facebook
3 3.2 Million Debit Cards Stolen In India By packetstormsecurity.com Published On :: Thu, 20 Oct 2016 14:04:13 GMT Full Article headline hacker india cybercrime data loss fraud
3 Inside The TalkTalk 'Indian Scam Call Center' By packetstormsecurity.com Published On :: Mon, 06 Mar 2017 16:18:26 GMT Full Article headline india cybercrime fraud scam
3 McDonald's India Delivery App Leaks User Data By packetstormsecurity.com Published On :: Mon, 20 Mar 2017 15:46:49 GMT Full Article headline privacy phone india data loss
3 India's Zomato Says Data From 17 Million Users Stolen By packetstormsecurity.com Published On :: Thu, 18 May 2017 14:15:24 GMT Full Article headline hacker privacy india data loss
3 Aadhaar: Leak In World's Biggest Database Worries Indians By packetstormsecurity.com Published On :: Fri, 05 Jan 2018 15:50:02 GMT Full Article headline government privacy india data loss
3 Hackers Steal $13.5 Million In Cosmos Bank Heist By packetstormsecurity.com Published On :: Mon, 27 Aug 2018 13:47:03 GMT Full Article headline hacker malware bank india cybercrime fraud
3 Google's Bug Bounty Program Just Had A Record-Breaking Year Of Payouts By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 15:36:03 GMT Full Article headline hacker flaw google
3 Joomla Fabrik 3.9.11 Directory Traversal By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:44:08 GMT Joomla Fabrik component version 3.9.11 suffers from a directory traversal vulnerability. Full Article
3 Zen Load Balancer 3.10.1 Directory Traversal By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 21:34:01 GMT Zen Load Balancer version 3.10.1 suffers from a directory traversal vulnerability. This finding was originally discovered by Cody Sixteen. Full Article
3 QRadar Community Edition 7.3.1.6 Arbitrary Object Instantiation By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:15:08 GMT QRadar Community Edition version 7.3.1.6 is vulnerable to instantiation of arbitrary objects based on user-supplied input. An authenticated attacker can abuse this to perform various types of attacks including server-side request forgery and (potentially) arbitrary execution of code. Full Article
3 Penitent Romanian Hacker Aims To Protect World's ATMs By packetstormsecurity.com Published On :: Sun, 19 May 2013 05:46:28 GMT Full Article headline hacker bank romania
3 FBI Arrests Five Over 'Hackers For Hire' Websites By packetstormsecurity.com Published On :: Mon, 27 Jan 2014 17:54:48 GMT Full Article headline hacker government india china cybercrime fraud romania fbi
3 AV Arcade 3 Insecure Cookie / SQL Injection By packetstormsecurity.com Published On :: Wed, 28 Jul 2010 17:44:53 GMT AV Arcade version 3 suffers from insecure cookie and SQL injection vulnerabilities. Full Article
3 WikiWebHelp 0.3.3 Insecure Cookie Handling By packetstormsecurity.com Published On :: Sun, 17 Oct 2010 22:31:47 GMT WikiWebHelp version 0.3.3 suffers from an insecure cookie handling vulnerability. Full Article
3 PHPDirector 0.30 Insecure Cookie Handling By packetstormsecurity.com Published On :: Wed, 27 Apr 2011 17:11:11 GMT PHPDirector version 0.30 suffers from an insecure cookie handling vulnerability that allows for privilege escalation. Full Article
3 AV Arcade Pro 5.4.3 Cookie Manipulation By packetstormsecurity.com Published On :: Sat, 15 Oct 2011 23:46:31 GMT AV Arcade Pro version 5.4.3 suffers from an insecure cookie vulnerability that allows for access bypass. Full Article
3 Latest Symantec CEO's 'Revolution' Could Axe 1,000 Jobs By packetstormsecurity.com Published On :: Thu, 24 Jan 2013 16:08:39 GMT Full Article headline virus symantec
3 Symantec: Don't Blame Us For New York Times Hack By packetstormsecurity.com Published On :: Fri, 01 Feb 2013 05:48:58 GMT Full Article headline hacker china data loss symantec
3 Google Makes Symantec An Offer It Can't Refuse By packetstormsecurity.com Published On :: Thu, 29 Oct 2015 15:42:12 GMT Full Article headline fraud google symantec cryptography
3 Google Will Remove Trust Of Symantec's PCA3-G1 Certificate By packetstormsecurity.com Published On :: Tue, 15 Dec 2015 01:05:58 GMT Full Article headline privacy google symantec cryptography
3 Symantec Flaws As Bad As It Gets, Claims Google's Project Zero By packetstormsecurity.com Published On :: Thu, 30 Jun 2016 02:19:04 GMT Full Article headline flaw google symantec backdoor
3 Symantec Won't Fix Catastrophic Flaws Until Mid-July By packetstormsecurity.com Published On :: Thu, 07 Jul 2016 13:39:59 GMT Full Article headline flaw symantec zero day
3 Google Takes Symantec To The Woodshed For Mis-Issuing 30,000 HTTPS Certs By packetstormsecurity.com Published On :: Fri, 24 Mar 2017 14:43:45 GMT Full Article headline privacy flaw google symantec cryptography
3 Mozilla Takes A Turn Slapping Symantec's Certification SNAFU By packetstormsecurity.com Published On :: Wed, 03 May 2017 14:20:37 GMT Full Article headline privacy google symantec mozilla cryptography
3 Hackers' Own Tools Are Full Of Vulnerabilities By packetstormsecurity.com Published On :: Wed, 26 Jul 2017 15:58:34 GMT Full Article headline hacker malware flaw symantec
3 23,000 HTTPS Certs Will Be Axed In Next 24 Hours Amid Bitter Turf War By packetstormsecurity.com Published On :: Thu, 01 Mar 2018 01:02:09 GMT Full Article headline privacy symantec cryptography
3 Microsoft Windows NtUserSetWindowFNID Win32k User Callback By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:32:16 GMT An elevation of privilege vulnerability exists in Microsoft Windows when the Win32k component fails to properly handle objects in memory. This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This Metasploit module is tested against Windows 10 v1703 x86. Full Article
3 Apple Security Advisory 2019-7-23-1 By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 18:22:22 GMT Apple Security Advisory 2019-7-23-1 - iCloud for Windows 7.13 is now available and addresses code execution and cross site scripting vulnerabilities. Full Article
3 ASX To MP3 Converter 3.1.3.7 Stack Overflow By packetstormsecurity.com Published On :: Thu, 10 Oct 2019 14:39:24 GMT This Metasploit module exploits a stack buffer overflow in ASX to MP3 converter 3.1.3.7. By constructing a specially crafted ASX file and attempting to convert it to an MP3 file in the application, a buffer is overwritten, which allows for running shellcode. Tested on: Microsoft Windows 7 Enterprise, 6.1.7601 Service Pack 1 Build 7601, x64-based PC Microsoft Windows 10 Pro, 10.0.18362 N/A Build 18362, x64-based PC. Full Article
3 It's Hacker Summer Camp This Week - Expect Searches For Guns In Your Hotel Room By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 14:42:12 GMT Full Article headline hacker government usa terror conference
3 Barr Pushes Apple For Help To Unlock Gunman's Phone By packetstormsecurity.com Published On :: Tue, 14 Jan 2020 15:50:39 GMT Full Article headline government privacy usa phone apple terror
3 Cybersecurity Lacking At Most Of The World's Major Airports By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:28:20 GMT Full Article headline hacker privacy data loss flaw terror
3 WordPress Tutor LMS 1.5.3 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:26:06 GMT WordPress Tutor LMS plugin version 1.5.3 suffers from a cross site request forgery vulnerability. Full Article
3 Wing FTP Server 6.2.3 Cross Site Request Forgery By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 12:02:22 GMT Wing FTP Server version 2.3 suffers from a cross site request forgery vulnerability. Full Article
3 Enhanced Multimedia Router 3.0.4.27 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:50:22 GMT Enhanced Multimedia Router version 3.0.4.27 suffers from a cross site request forgery vulnerability. Full Article
3 QRadar Community Edition 7.3.1.6 CSRF / Weak Access Control By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 19:57:06 GMT QRadar Community Edition version 7.3.1.6 suffers from cross site request forgery and weak access control vulnerabilities. Full Article
3 Edimax EW-7438RPn Cross Site Request Forgery By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:06:13 GMT Edimax EW-7438RPn suffers from a cross site request forgery vulnerability. Full Article
3 Maian Support Helpdesk 4.3 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 15:15:48 GMT Maian Support Helpdesk version 4.3 suffers from a cross site request forgery vulnerability. Full Article
3 Apache OFBiz 17.12.03 Cross Site Request Forgery By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:44:30 GMT Apache OFBiz version 17.12.03 suffers from a cross site request forgery vulnerability. Full Article
3 Hospitals Must Secure Vital Backend Networks Before It's Too Late By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:06:46 GMT Full Article headline hacker privacy
3 Sentrifugo 3.2 File Upload Restriction Bypass By packetstormsecurity.com Published On :: Fri, 30 Aug 2019 15:49:24 GMT Sentrifugo version 3.2 suffers from a file upload restriction bypass vulnerability. Full Article
3 Dokeos 1.8.6.1 / 1.8.6.3 Arbitrary File Upload By packetstormsecurity.com Published On :: Sat, 21 Sep 2019 18:09:40 GMT Dokeos versions 1.8.6.1 and 1.8.6.3 suffer from a remote file upload vulnerability via an fckeditor. Full Article
3 Linear eMerge E3 1.00-06 Arbitrary File Upload Remote Root Code Execution By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 17:10:03 GMT Linear eMerge E3 versions 1.00-06 and below arbitrary file upload remote root code execution exploit. Full Article
3 Optergy 2.3.0a Remote Root By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 18:44:20 GMT Optergy versions 2.3.0a and below authenticated file upload remote root code execution exploit. Full Article