2 XOOPS 2.5.7.2 Weak Crypto By packetstormsecurity.com Published On :: Fri, 18 Mar 2016 22:22:22 GMT XOOPS version 2.5.7.2 uses weak one way hash crypto MD5 along with unsalted passwords stored in the database. Full Article
2 Apple Security Advisory 2016-03-21-7 By packetstormsecurity.com Published On :: Tue, 22 Mar 2016 15:23:11 GMT Apple Security Advisory 2016-03-21-7 - OS X Server 5.1 is now available and addresses RC4 crypto weaknesses, file access, and information disclosure vulnerabilities. Full Article
2 Key Reinstallation: Forcing Nonce Reuse In WPA2 By packetstormsecurity.com Published On :: Mon, 16 Oct 2017 13:34:29 GMT Whitepaper called Reinstallation Attacks: Forcing Nonce Reuse in WPA2. This research paper will be presented on at the Computer and Communications Security (CCS) conference on November 1, 2017. This paper details a flaw in the WPA2 protocol itself and most devices that makes use of WPA2 are affected. Full Article
2 Ubuntu Security Notice USN-3616-2 By packetstormsecurity.com Published On :: Mon, 09 Apr 2018 16:41:45 GMT Ubuntu Security Notice 3616-2 - USN-3616-1 fixed a vulnerability in Python Crypto. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that Python Crypto incorrectly generated ElGamal key parameters. A remote attacker could possibly use this issue to obtain sensitive information. Various other issues were also addressed. Full Article
2 Ubuntu Security Notice USN-3727-1 By packetstormsecurity.com Published On :: Wed, 01 Aug 2018 18:32:00 GMT Ubuntu Security Notice 3727-1 - It was discovered that Bouncy Castle incorrectly handled certain crypto algorithms. A remote attacker could possibly use these issues to obtain sensitive information, including private keys. Full Article
2 Debian Security Advisory 4296-1 By packetstormsecurity.com Published On :: Tue, 18 Sep 2018 02:18:40 GMT Debian Linux Security Advisory 4296-1 - Two vulnerabilities were discovered in mbedtls, a lightweight crypto and SSL/TLS library which could result in plain text recovery via side-channel attacks. Full Article
2 No cON Name 2019 Call For Papers By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:21:33 GMT The No cON Name 2019 call for papers has been announced. It will be held in Barcelona, Spain, from November 14th and 15th, 2019. Full Article
2 BSidesLisbon 2019 Call For Papers By packetstormsecurity.com Published On :: Sat, 24 Aug 2019 10:21:11 GMT BSidesLisbon 2019 has announced its call for papers. It will be held November 28th and 29th at Auditorio FMD-UL. Full Article
2 ZeroNights 2019 Call For Papers By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 23:43:07 GMT The ZeroNights 2019 Call For Papers has been announced. It will be held in Saint-Petersburg, Russia November 12th through the 13th, 2019. Full Article
2 RootedCON 2020 Call For Papers By packetstormsecurity.com Published On :: Fri, 01 Nov 2019 16:55:55 GMT RootedCON is a technology congress that will be held in Madrid (Spain) March 5th through the 7th, 2020. With an estimated seating from 2,000 and 2,500 people, is the most relevant specialized congress that is held in the country, and one of the most relevant in Europe, with attendee profiles ranging from students, Law Enforcement Agencies to professionals in the technology and information security market and, even, just passionate people. Full Article
2 c0c0n 2020 Call For Papers By packetstormsecurity.com Published On :: Fri, 15 Nov 2019 21:25:45 GMT The c0c0n 2020 Middle East call for papers has been announced. It will take place June 15th through the 18th, 2020 at the St. Regis in Abu Dhabi. Full Article
2 BSidesLjubljana 2020 Call For Papers By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 15:39:12 GMT B-Sides Ljubljana will be held April 4th, 2020 in Ljubljana, Slovenia. Full Article
2 LeHACK 2020 Call For Papers By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:12:37 GMT LeHACK 2020 is a yearly rendezvous where hackers and aficionados are meeting with both technical and non-technical talks and workshops about hacking. It is a great place to discover, to learn, to teach and be taught in the magical city of Paris. LeHACK 2020 will be held in La Cite des Sciences et de l'Industire in Paris, France from June 26th through the 27th, 2020. Full Article
2 REVULN 20x1 Call For Papers By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:40:33 GMT REVULN 20x1 is an international conference taking place the April 28th through the 30th, 2020 in Metro Manila (Philippines) at the RED Hotel Cubao. Full Article
2 REVULN 20x2 Call For Papers By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:42:52 GMT REVULN 20x2 is an international conference taking place the June 25th through the 26th, 2020 in St. Paul's Bay (Malta) at the Hotel Santana. Full Article
2 Bsides Brussels 2020 Call For Papers By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 14:21:30 GMT BSides Brussels is a security conference in Brussels, Belgium, with talks, workshops and villages. The goal is to strengthen the exchange of knowledge, cooperation, communication, and integration between the different actors active in the IT security industry. We are pleased to announce that the first edition of BSides Brussels will be held on May 28th, 2020. Full Article
2 Apache2 Web Server Hardening Article By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 15:20:36 GMT This is an article discussing Apache2 Web Server hardening. Written in Turkish. Full Article
2 All Phones In India To Be Equipped With Panic Buttons From 2017 By packetstormsecurity.com Published On :: Wed, 27 Apr 2016 14:37:59 GMT Full Article headline phone india
2 3.2 Million Debit Cards Stolen In India By packetstormsecurity.com Published On :: Thu, 20 Oct 2016 14:04:13 GMT Full Article headline hacker india cybercrime data loss fraud
2 24 People Sentenced In India-Based Phone-Scam Case By packetstormsecurity.com Published On :: Tue, 24 Jul 2018 15:50:57 GMT Full Article headline phone india fraud
2 Huawei HG255 Directory Traversal By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 17:20:10 GMT This Metasploit module exploits a directory traversal in Huawei HG255. Full Article
2 FIBARO System Home Center 5.021 Remote File Inclusion / XSS By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:12:32 GMT FIBARO System Home Center version 5.021 suffers from cross site scripting and remote file inclusion vulnerabilities. Full Article
2 Booked Scheduler 2.7.7 Directory Traversal By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:37:26 GMT Booked Scheduler version 2.7.7 suffers from an authenticated directory traversal vulnerability. Full Article
2 Police In Romania Detain 20 Alleged Hackers By packetstormsecurity.com Published On :: Wed, 11 Mar 2009 17:03:38 GMT Full Article hacker government fraud romania
2 Romanian Gets 21-Months For Subway POS Hack By packetstormsecurity.com Published On :: Wed, 09 Jan 2013 06:40:46 GMT Full Article headline hacker usa fraud flaw romania
2 PhreeBooks ERP 5.2.5 Remote Command Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 20:47:47 GMT PhreeBooks ERP version 5.2.5 suffers from a remote command execution vulnerability. Full Article
2 Kentico CMS 12.0.14 Remote Command Execution By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:59:11 GMT This Metasploit module exploits a vulnerability in the Kentico CMS platform versions 12.0.14 and earlier. Remote command execution is possible via unauthenticated XML requests to the Staging Service SyncServer.asmx interface ProcessSynchronizationTaskData method stagingTaskData parameter. XML input is passed to an insecure .NET deserialize call which allows for remote command execution. Full Article
2 velBox 1.2 Insecure Cookie Handling By packetstormsecurity.com Published On :: Thu, 01 Apr 2010 23:22:33 GMT velBox version 1.2 suffers from an insecure cookie handling vulnerability. Full Article
2 xWeblog 2.2 Insecure Cookie Handling By packetstormsecurity.com Published On :: Mon, 11 Oct 2010 00:50:01 GMT xWeblog version 2.2 suffers from an insecure cookie handling vulnerability. Full Article
2 PHP Hosting Directory 2.0 Insecure Cookie By packetstormsecurity.com Published On :: Mon, 11 Oct 2010 01:03:08 GMT PHP Hosting Directory version 2.0 suffers from an insecure cookie vulnerability that allows for administrative bypass. Full Article
2 Totaljs CMS 12.0 Insecure Admin Session Cookie By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 23:20:22 GMT Totaljs CMS version 12.0 mints an insecure cookie that can be used to crack the administrator password. Full Article
2 Red Hat Security Advisory 2020-1975-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:37 GMT Red Hat Security Advisory 2020-1975-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
2 Red Hat Security Advisory 2020-1979-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:52 GMT Red Hat Security Advisory 2020-1979-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
2 Red Hat Security Advisory 2020-1978-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:05 GMT Red Hat Security Advisory 2020-1978-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
2 Red Hat Security Advisory 2020-1980-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:13 GMT Red Hat Security Advisory 2020-1980-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
2 Red Hat Security Advisory 2020-1422-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:30 GMT Red Hat Security Advisory 2020-1422-01 - This release of Red Hat build of Eclipse Vert.x 3.9.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Full Article
2 23,000 HTTPS Certs Will Be Axed In Next 24 Hours Amid Bitter Turf War By packetstormsecurity.com Published On :: Thu, 01 Mar 2018 01:02:09 GMT Full Article headline privacy symantec cryptography
2 Over 25,000 Linksys Routers Are Leaking Sensitive Data By packetstormsecurity.com Published On :: Tue, 14 May 2019 13:51:12 GMT Full Article headline hacker privacy data loss flaw cisco
2 Over 20k Linksys Routers Leak Every Device Ever Connected By packetstormsecurity.com Published On :: Mon, 20 May 2019 14:43:25 GMT Full Article headline privacy data loss flaw cisco
2 Microsoft Windows NtUserSetWindowFNID Win32k User Callback By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:32:16 GMT An elevation of privilege vulnerability exists in Microsoft Windows when the Win32k component fails to properly handle objects in memory. This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This Metasploit module is tested against Windows 10 v1703 x86. Full Article
2 Apple Security Advisory 2019-7-23-1 By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 18:22:22 GMT Apple Security Advisory 2019-7-23-1 - iCloud for Windows 7.13 is now available and addresses code execution and cross site scripting vulnerabilities. Full Article
2 Apple Security Advisory 2019-10-07-4 By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 20:44:48 GMT Apple Security Advisory 2019-10-07-4 - iCloud for Windows 7.14 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities. Full Article
2 Red Hat Security Advisory 2019-1790-01 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:10:26 GMT Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
2 Red Hat Security Advisory 2019-1942-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:17:37 GMT Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
2 Red Hat Security Advisory 2019-2097-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:11:21 GMT Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability. Full Article
2 Red Hat Security Advisory 2019-2400-01 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:08:30 GMT Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
2 Webmin 1.920 password_change.cgi Backdoor By packetstormsecurity.com Published On :: Fri, 23 Aug 2019 20:09:56 GMT This Metasploit module exploits a backdoor in Webmin versions 1.890 through 1.920. Only the SourceForge downloads were backdoored, but they are listed as official downloads on the project's site. Unknown attacker(s) inserted Perl qx statements into the build server's source code on two separate occasions: once in April 2018, introducing the backdoor in the 1.890 release, and in July 2018, reintroducing the backdoor in releases 1.900 through 1.920. Only version 1.890 is exploitable in the default install. Later affected versions require the expired password changing feature to be enabled. Full Article
2 Gentoo Linux Security Advisory 201909-01 By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 22:21:33 GMT Gentoo Linux Security Advisory 201909-1 - Multiple vulnerabilities have been found in Perl, the worst of which could result in the arbitrary execution of code. Versions less than 5.28.2 are affected. Full Article
2 Red Hat Security Advisory 2020-1616-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:22:15 GMT Red Hat Security Advisory 2020-1616-01 - Irssi is a modular IRC client with Perl scripting. Issues addressed include a use-after-free vulnerability. Full Article
2 Ice HRM 26.2.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Sun, 16 Feb 2020 20:22:22 GMT Ice HRM version 26.2.0 suffers from a cross site request forgery vulnerability. Full Article