3 Nanometrics Centaur 4.3.23 Memory Leak By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:17:55 GMT Nanometrics Centaur version 4.3.23 suffers from an unauthenticated remote memory leak vulnerability. Full Article
3 Red Hat Security Advisory 2020-1735-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:37:52 GMT Red Hat Security Advisory 2020-1735-01 - The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Issues addressed include denial of service and memory leak vulnerabilities. Full Article
3 HexView Security Advisory 2004-05-03.01 By packetstormsecurity.com Published On :: Tue, 18 May 2004 23:46:47 GMT SGI Security Advisory 20040503-01-P - Under certain conditions, rpc.mountd goes into an infinite loop while processing some RPC requests, causing a denial of service. Affected releases: SGI IRIX 6.5.x. Full Article
3 iDEFENSE Security Advisory 2005-01-13.3 By packetstormsecurity.com Published On :: Sun, 16 Jan 2005 05:55:12 GMT iDEFENSE Security Advisory 01.13.05-3 - Local exploitation of a design error vulnerability in the inpview command included in multiple versions of Silicon Graphics Inc.'s IRIX could allow for arbitrary code execution as the root user. iDEFENSE has confirmed the existence of this vulnerability in SGI IRIX version 6.5.9 (feature) and 6.5.22 (maintenance). Full Article
3 Firewall Log Watch 1.3 By packetstormsecurity.com Published On :: Tue, 15 Nov 2011 05:42:24 GMT fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface. Full Article
3 Apple's Corellium Lawsuit Causes Chilling Effect With Security Researchers By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:30:58 GMT Full Article headline hacker phone apple
3 GRR 3.3.0.3 By packetstormsecurity.com Published On :: Mon, 01 Jul 2019 15:35:39 GMT GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data. Full Article
3 GRR 3.3.0.4 By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 18:35:14 GMT GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data. Full Article
3 GRR 3.3.0.8 By packetstormsecurity.com Published On :: Thu, 10 Oct 2019 15:11:18 GMT GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data. Full Article
3 GRR 3.4.0.1 By packetstormsecurity.com Published On :: Wed, 18 Dec 2019 22:32:21 GMT GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data. Full Article
3 GPlayed Trojan's Baby Brother Is After Your Bank Account By packetstormsecurity.com Published On :: Tue, 30 Oct 2018 15:43:10 GMT Full Article headline malware bank trojan cybercrime fraud
3 Samhain File Integrity Checker 4.1.3 By packetstormsecurity.com Published On :: Tue, 19 Apr 2016 19:33:33 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
3 AIX 5.3 / 6.1 / 7.1 / 7.2 lquerylv Local Root By packetstormsecurity.com Published On :: Fri, 04 Nov 2016 14:44:44 GMT This exploit takes advantage of known issues with debugging functions within the AIX linker library. It takes advantage of known functionality, and focuses on badly coded SUID binaries which do not adhere to proper security checks prior to seteuid/open/writes. Full Article
3 Samhain File Integrity Checker 4.2.3 By packetstormsecurity.com Published On :: Wed, 01 Nov 2017 16:25:45 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
3 Samhain File Integrity Checker 4.3.0 By packetstormsecurity.com Published On :: Mon, 10 Sep 2018 18:02:47 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
3 Samhain File Integrity Checker 4.3.1 By packetstormsecurity.com Published On :: Tue, 25 Sep 2018 20:16:41 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
3 Samhain File Integrity Checker 4.3.2 By packetstormsecurity.com Published On :: Mon, 07 Jan 2019 18:54:17 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
3 Ubuntu Security Notice USN-3457-1 By packetstormsecurity.com Published On :: Mon, 23 Oct 2017 13:51:09 GMT Ubuntu Security Notice 3457-1 - Brian Carpenter discovered that curl incorrectly handled IMAP FETCH response lines. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly execute arbitrary code. Full Article
3 Red Hat Security Advisory 2017-3263-01 By packetstormsecurity.com Published On :: Mon, 27 Nov 2017 10:10:00 GMT Red Hat Security Advisory 2017-3263-01 - The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix: A buffer overrun flaw was found in the IMAP handler of libcurl. By tricking an unsuspecting user into connecting to a malicious IMAP server, an attacker could exploit this flaw to potentially cause information disclosure or crash the application. Full Article
3 Ubuntu Security Notice USN-3724-1 By packetstormsecurity.com Published On :: Thu, 26 Jul 2018 00:00:01 GMT Ubuntu Security Notice 3724-1 - Jon Kristensen discovered that Evolution Data Server would automatically downgrade a connection to an IMAP server if the IMAP server did not support SSL. This would result in the user's password being unexpectedly sent in clear text, even though the user had requested to use SSL. Full Article
3 PHP 5.2.3 imap_open Bypass By packetstormsecurity.com Published On :: Thu, 15 Nov 2018 17:45:50 GMT PHP version 5.2.3 (Debian) suffers from an imap imap_open disable functions bypass vulnerability. Full Article
3 Debian Security Advisory 4344-1 By packetstormsecurity.com Published On :: Mon, 26 Nov 2018 08:32:22 GMT Debian Linux Security Advisory 4344-1 - Aidan Marlin discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, is prone to a cross-site scripting vulnerability in handling invalid style tag content. Full Article
3 Red Hat Security Advisory 2019-2836-01 By packetstormsecurity.com Published On :: Fri, 20 Sep 2019 14:59:48 GMT Red Hat Security Advisory 2019-2836-01 - Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Issues addressed include an out of bounds write vulnerability. Full Article
3 Red Hat Security Advisory 2019-3467-01 By packetstormsecurity.com Published On :: Wed, 06 Nov 2019 15:40:34 GMT Red Hat Security Advisory 2019-3467-01 - Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. An improper certificate validation flaw was addressed. Full Article
3 Analyzing A Massive Office 365 Phishing Campaign By packetstormsecurity.com Published On :: Tue, 05 Mar 2019 01:03:51 GMT Full Article headline microsoft password phish
3 India's Wipro Investigating Phishing Of Employee Accounts By packetstormsecurity.com Published On :: Tue, 16 Apr 2019 22:07:35 GMT Full Article headline india password phish
3 FreeBSD Security Advisory - FreeBSD-SA-19:13.pts By packetstormsecurity.com Published On :: Thu, 25 Jul 2019 10:11:11 GMT FreeBSD Security Advisory - The code which handles a close(2) of a descriptor created by posix_openpt(2) fails to undo the configuration which causes SIGIO to be raised. This bug can lead to a write-after-free of kernel memory. The bug permits malicious code to trigger a write-after-free, which may be used to gain root privileges or escape a jail. Full Article
3 Red Hat Security Advisory 2019-3513-01 By packetstormsecurity.com Published On :: Wed, 06 Nov 2019 15:49:23 GMT Red Hat Security Advisory 2019-3513-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Full Article
3 Mobile Security Framework MobSF 0.9.3 Beta By packetstormsecurity.com Published On :: Wed, 23 Nov 2016 00:49:57 GMT Mobile Security Framework (MobSF) is an all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis. It can be used for effective and fast security analysis of Android and iOS Applications and supports both binaries (APK & IPA) and zipped source code. MobSF can also do Web API Security testing with it's API Fuzzer that performs Information Gathering, analyze Security Headers, identify Mobile API specific vulnerabilities like XXE, SSRF, Path Traversal, IDOR, and other logical issues related to Session Management and API Rate Limiting. Full Article
3 ISO-8385 Protocol Fuzzer By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:22:40 GMT This python script is a fuzzer for the ISO-8385 financial protocol. It is compatible with sulley and bofuzz and is now part of the official bofuzz release. Full Article
3 Trust Fined £225k For Leaving Files In Abandoned Hospital By packetstormsecurity.com Published On :: Tue, 19 Jun 2012 15:39:27 GMT Full Article headline government data loss ireland
3 First Irish-Speaking Virus Holds Bloke's Computer To Ransom By packetstormsecurity.com Published On :: Sat, 08 Sep 2012 00:36:18 GMT Full Article headline malware virus cybercrime fraud ireland
3 DDoS Attack Disrupts Ireland's National Lottery By packetstormsecurity.com Published On :: Thu, 21 Jan 2016 14:42:09 GMT Full Article headline denial of service ireland
3 Major Win For Microsoft In 'Free For All' Data Case By packetstormsecurity.com Published On :: Fri, 15 Jul 2016 04:51:36 GMT Full Article headline government privacy microsoft usa spyware ireland
3 Hackers Deface Indonesian President's Website By packetstormsecurity.com Published On :: Fri, 11 Jan 2013 15:54:11 GMT Full Article headline hacker indonesia
3 2015 UniCredit Data Breach Affects 3 Million Italian Clients By packetstormsecurity.com Published On :: Mon, 28 Oct 2019 16:58:05 GMT Full Article headline hacker privacy data loss italy
3 This Bank Had The Worst Password Policy We've Ever Seen By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:40:43 GMT Full Article headline bank google password italy
3 IPSet List 3.6 By packetstormsecurity.com Published On :: Sun, 17 Apr 2016 11:11:11 GMT ipset_list is a wrapper script written in bash for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. The output can optionally be colorized. An interactive mode allows to select the query options in a wizard based manner. Full Article
3 Raptor WAF 0.3 By packetstormsecurity.com Published On :: Sat, 29 Oct 2016 17:32:22 GMT Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals. Full Article
3 FireHOL 3.0.2 By packetstormsecurity.com Published On :: Wed, 23 Nov 2016 15:38:11 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
3 FireHOL 3.1.0 By packetstormsecurity.com Published On :: Tue, 29 Nov 2016 18:53:55 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
3 FireHOL 3.1.1 By packetstormsecurity.com Published On :: Tue, 10 Jan 2017 23:02:22 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
3 FireHOL 3.1.2 By packetstormsecurity.com Published On :: Wed, 08 Feb 2017 23:02:22 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
3 FireHOL 3.1.3 By packetstormsecurity.com Published On :: Sat, 18 Feb 2017 16:01:21 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
3 FireHOL 3.1.4 By packetstormsecurity.com Published On :: Sun, 20 Aug 2017 18:22:22 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
3 FireHOL 3.1.5 By packetstormsecurity.com Published On :: Tue, 19 Sep 2017 02:44:24 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
3 IPSet List 3.7 By packetstormsecurity.com Published On :: Sun, 05 Nov 2017 15:52:40 GMT ipset_list is a wrapper script written in bash for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. The output can optionally be colorized. An interactive mode allows to select the query options in a wizard based manner. Full Article
3 FireHOL 3.1.6 By packetstormsecurity.com Published On :: Mon, 13 Aug 2018 19:38:27 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
3 IPSet List 3.7.1 By packetstormsecurity.com Published On :: Tue, 12 Feb 2019 18:41:58 GMT ipset_list is a wrapper script written in bash for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. The output can optionally be colorized. An interactive mode allows to select the query options in a wizard based manner. Full Article
3 IPSet List 3.7.2 By packetstormsecurity.com Published On :: Thu, 14 Feb 2019 15:04:16 GMT ipset_list is a wrapper script written in bash for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. The output can optionally be colorized. An interactive mode allows to select the query options in a wizard based manner. Full Article