2 Gentoo Linux Security Advisory 202003-61 By packetstormsecurity.com Published On :: Fri, 27 Mar 2020 13:16:57 GMT Gentoo Linux Security Advisory 202003-61 - A vulnerability in Adobe Flash Player might allow remote attackers to execute arbitrary code. Versions less than 32.0.0.330 are affected. Full Article
2 Gentoo Linux Security Advisory 202003-62 By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:43:48 GMT Gentoo Linux Security Advisory 202003-62 - A buffer overflow in GNU Screen might allow remote attackers to corrupt memory. Versions less than 4.8.0 are affected. Full Article
2 Gentoo Linux Security Advisory 202003-63 By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:44:53 GMT Gentoo Linux Security Advisory 202003-63 - Multiple vulnerabilities have been found in GNU IDN Library 2, the worst of which could result in the remote execution of arbitrary code. Versions less than 2.2.0 are affected. Full Article
2 Gentoo Linux Security Advisory 202003-64 By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:45:07 GMT Gentoo Linux Security Advisory 202003-64 - Multiple vulnerabilities have been found in libxls, the worst of which could result in the arbitrary execution of code. Versions less than 1.5.2 are affected. Full Article
2 Gentoo Linux Security Advisory 202003-65 By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:47:19 GMT Gentoo Linux Security Advisory 202003-65 - Multiple vulnerabilities have been found in FFmpeg, the worst of which allows remote attackers to execute arbitrary code. Versions greater than or equal to 4 are affected. Full Article
2 Gentoo Linux Security Advisory 202003-66 By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:47:42 GMT Gentoo Linux Security Advisory 202003-66 - Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. Versions less than 4.2.0-r2 are affected. Full Article
2 Gentoo Linux Security Advisory 202004-01 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:43:50 GMT Gentoo Linux Security Advisory 202004-1 - A vulnerability in HAProxy might lead to remote execution of arbitrary code. Versions less than 2.0.10 are affected. Full Article
2 Gentoo Linux Security Advisory 202004-02 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:43:57 GMT Gentoo Linux Security Advisory 202004-2 - Multiple vulnerabilities have been found in VirtualBox, the worst of which could allow an attacker to take control of VirtualBox. Versions prior to 6.1.2 are affected. Full Article
2 Gentoo Linux Security Advisory 202004-03 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:45:09 GMT Gentoo Linux Security Advisory 202004-3 - Multiple vulnerabilities have been found in GPL Ghostscript, the worst of which could result in the execution of arbitrary code. Versions prior to 9.28_rc4 are affected. Full Article
2 Gentoo Linux Security Advisory 202004-04 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:45:44 GMT Gentoo Linux Security Advisory 202004-4 - A heap use-after-free flaw in Qt WebEngine at worst might allow an attacker to execute arbitrary code. Versions less than 5.14.1 are affected. Full Article
2 Gentoo Linux Security Advisory 202004-05 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:46:21 GMT Gentoo Linux Security Advisory 202004-5 - Multiple vulnerabilities have been found in ledger, the worst of which could result in the arbitrary execution of code. Versions less than 3.1.2 are affected. Full Article
2 Gentoo Linux Security Advisory 202004-07 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:26:49 GMT Gentoo Linux Security Advisory 202004-7 - Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. Versions less than 74.0.1 are affected. Full Article
2 Gentoo Linux Security Advisory 202004-08 By packetstormsecurity.com Published On :: Sat, 11 Apr 2020 12:12:12 GMT Gentoo Linux Security Advisory 202004-8 - A vulnerability in libssh could allow a remote attacker to cause a Denial of Service condition. Versions less than 0.9.4 are affected. Full Article
2 Gentoo Linux Security Advisory 202004-09 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 14:47:28 GMT Gentoo Linux Security Advisory 202004-9 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could allow remote attackers to execute arbitrary code. Versions less than 81.0.4044.92 are affected. Full Article
2 Gentoo Linux Security Advisory 202004-10 By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:28:42 GMT Gentoo Linux Security Advisory 202004-10 - Multiple vulnerabilities were found in OpenSSL, the worst of which could allow remote attackers to cause a Denial of Service condition. Versions less than 1.1.1g are affected. Full Article
2 Gentoo Linux Security Advisory 202004-11 By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:31:47 GMT Gentoo Linux Security Advisory 202004-11 - Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. Versions less than 68.7.0 are affected. Full Article
2 Gentoo Linux Security Advisory 202004-12 By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:35:36 GMT Gentoo Linux Security Advisory 202004-12 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could allow remote attackers to execute arbitrary code. Versions less than 81.0.4044.122 are affected. Full Article
2 Gentoo Linux Security Advisory 202004-13 By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:36:14 GMT Gentoo Linux Security Advisory 202004-13 - Multiple vulnerabilities have been found in Git which might all allow attackers to access sensitive information. Versions less than 2.26.2 are affected. Full Article
2 Grub2 grub2-set-bootflag Environment Corruption By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 23:02:22 GMT Grub2 has grub2-set-bootflag setuid in the new Fedora release and has the ability to corrupt the environment. Full Article
2 Red Hat Security Advisory 2020-1937-01 By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:20:12 GMT Red Hat Security Advisory 2020-1937-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability. Full Article
2 Red Hat Security Advisory 2020-1940-01 By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:20:25 GMT Red Hat Security Advisory 2020-1940-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability. Full Article
2 Red Hat Security Advisory 2020-1939-01 By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:24:49 GMT Red Hat Security Advisory 2020-1939-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Full Article
2 Red Hat Security Advisory 2020-1942-01 By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:28:54 GMT Red Hat Security Advisory 2020-1942-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Full Article
2 Red Hat Security Advisory 2020-1938-01 By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:29:03 GMT Red Hat Security Advisory 2020-1938-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Full Article
2 Red Hat Security Advisory 2020-2014-01 By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:04:44 GMT Red Hat Security Advisory 2020-2014-01 - SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Full Article
2 Digital Whisper Electronic Magazine #92 By packetstormsecurity.com Published On :: Wed, 01 Aug 2018 01:11:11 GMT Digital Whisper Electronic Magazine issue 92. Written in Hebrew. Full Article
2 Digital Whisper Electronic Magazine #102 By packetstormsecurity.com Published On :: Mon, 03 Jun 2019 05:02:22 GMT Digital Whisper Electronic Magazine issue 102. Written in Hebrew. Full Article
2 Linux/x86 TCP Reverse Shell 127.0.0.1 Nullbyte Free Shellcode By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 18:21:11 GMT Linux/x86 TCP reverse shell 127.0.0.1 nullbyte free shellcode. Full Article
2 Red Hat Security Advisory 2020-1000-01 By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 18:22:22 GMT Red Hat Security Advisory 2020-1000-01 - The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format. A heap-based overflow was addressed. Full Article
2 Red Hat Security Advisory 2020-1289-01 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:47:19 GMT Red Hat Security Advisory 2020-1289-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include an out of bounds write vulnerability. Full Article
2 Red Hat Security Advisory 2020-1290-01 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 15:00:03 GMT Red Hat Security Advisory 2020-1290-01 - HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high availability environments. Issues addressed include an out of bounds write vulnerability. Full Article
2 Red Hat Security Advisory 2020-1288-01 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 15:00:14 GMT Red Hat Security Advisory 2020-1288-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include an out of bounds write vulnerability. Full Article
2 Red Hat Security Advisory 2020-1702-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:27:31 GMT Red Hat Security Advisory 2020-1702-01 - The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format. Issues addressed include a heap overflow vulnerability. Full Article
2 GNU SIP Witch Telephony Server 0.7.2 By packetstormsecurity.com Published On :: Tue, 23 Feb 2010 07:43:39 GMT GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate. Full Article
2 SIPVicious Tool Suite 0.2.6 By packetstormsecurity.com Published On :: Wed, 23 Jun 2010 06:57:48 GMT SIPVicious tools address the need for traditional security tools to be ported to SIP. This package consists of a SIP scanner, a SIP wardialer, and a SIP PBX cracker. Written in Python. Full Article
2 GNU SIP Witch Telephony Server 0.9.2 By packetstormsecurity.com Published On :: Thu, 11 Nov 2010 01:27:41 GMT GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate. Full Article
2 GNU SIP Witch Telephony Server 0.10.2 By packetstormsecurity.com Published On :: Fri, 18 Mar 2011 23:03:05 GMT GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate. Full Article
2 Cisco Security Advisory 20130206-ata187 By packetstormsecurity.com Published On :: Wed, 06 Feb 2013 21:24:41 GMT Cisco Security Advisory - Cisco ATA 187 Analog Telephone Adaptor firmware versions 9.2.1.0 and 9.2.3.1 contain a vulnerability that could allow an unauthenticated, remote attacker to access the operating system of the affected device. Cisco has available free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. Full Article
2 Secunia Security Advisory 52060 By packetstormsecurity.com Published On :: Thu, 07 Feb 2013 07:41:49 GMT Secunia Security Advisory - A vulnerability has been reported in Cisco ATA 187 Analog Telephone Adaptor, which can be exploited by malicious people to compromise a vulnerable device. Full Article
2 SIPPTS 1.2.2 By packetstormsecurity.com Published On :: Tue, 23 Oct 2018 23:09:00 GMT SIPPTS is a set of tools to audit VoIP servers and devices using the SIP protocol. It is a set of perl scripts that allow you to identify extensions, remotely crack passwords, check for missing authentication to make phone calls, and more. Full Article
2 Secunia Security Advisory 38628 By packetstormsecurity.com Published On :: Mon, 15 Feb 2010 14:26:42 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper Networks Installer Service, which can be exploited by malicious people to compromise a vulnerable system. Full Article
2 ProCheckUp Security Advisory 2009.16 By packetstormsecurity.com Published On :: Thu, 15 Jul 2010 00:49:36 GMT Procheckup has found by making a malformed request to the Juniper IVE Web interface without authentication, that a vanilla cross site scripting (XSS) attack is possible. Full Article
2 Zero Day Initiative Advisory 10-231 By packetstormsecurity.com Published On :: Mon, 08 Nov 2010 23:34:08 GMT Zero Day Initiative Advisory 10-231 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Juniper SA Series devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the meeting_testjava.cgi page which is used to test JVM compatibility. When handling the DSID HTTP header the code allows an attacker to inject arbitrary javascript into the page. This can be abused by an attacker to perform a cross-site scripting attack on the device. Full Article
2 Secunia Security Advisory 42145 By packetstormsecurity.com Published On :: Tue, 09 Nov 2010 07:59:31 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper IVE OS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
2 Secunia Security Advisory 48720 By packetstormsecurity.com Published On :: Thu, 05 Apr 2012 05:30:28 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper IVE OS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
2 Secunia Security Advisory 51832 By packetstormsecurity.com Published On :: Tue, 15 Jan 2013 03:13:49 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper JunosE, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Article
2 Juniper SSG20 Denial Of Service By packetstormsecurity.com Published On :: Thu, 23 Jan 2014 00:22:22 GMT A special crafted ICMP ECHO REQUEST can cause a denial of service condition on the Juniper SSG20. Full Article
2 REVULN 20x3 Call For Papers By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:14:30 GMT REVULN 20x3 is an international conference taking place on September 9th through the 10th, 2020 in Bangkok (Thailand) at Ibis Styles Bangkok Sukhumvit Phra Khanong. Full Article
2 Hackers 2 Hackers Conference 17th Edition Call For Papers By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 19:22:22 GMT The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020. Full Article
2 Symantec Web Gateway 5.0.2.8 Remote Command Execution By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:33:55 GMT This is a whitepaper tutorial that walks through creating a proof of concept exploit for a pre-authentication remote command execution vulnerability in Symantec Web Gateway version 5.0.2.8. Full Article