2 Apple Security Advisory 2019-9-26-9 By packetstormsecurity.com Published On :: Sun, 29 Sep 2019 17:32:22 GMT Apple Security Advisory 2019-9-26-9 - Safari 13.0.1 addresses user interface spoofing and browser history leakage vulnerabilities. Full Article
2 Fortinet FortiSIEM 5.0 / 5.2.1 Improper Certification Validation By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 20:48:19 GMT A FortiSIEM collector connects to a Supervisor/Worker over HTTPS TLS (443/TCP) to register itself as well as relaying event data such as syslog, netflow, SNMP, etc. When the Collector (the client) connects to the Supervisor/Worker (the server), the client does not validate the server-provided certificate against its root-CA store. Since the client does no server certificate validation, this means any certificate presented to the client will be considered valid and the connection will succeed. If an attacker spoofs a Worker/Supervisor using an ARP or DNS poisoning attack (or any other MITM attack), the Collector will blindly connect to the attacker's HTTPS TLS server. It will disclose the authentication password used along with any data being relayed. Versions 5.0 and 5.2.1 have been tested and are affected. Full Article
2 Ubuntu Security Notice USN-4202-2 By packetstormsecurity.com Published On :: Tue, 10 Dec 2019 23:02:29 GMT Ubuntu Security Notice 4202-2 - USN-4202-1 fixed vulnerabilities in Thunderbird. After upgrading, Thunderbird created a new profile for some users. This update fixes the problem. It was discovered that a specially crafted S/MIME message with an inner encryption layer could be displayed as having a valid signature in some circumstances, even if the signer had no access to the encrypted message. An attacker could potentially exploit this to spoof the message author. Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, bypass security restrictions, bypass same-origin restrictions, conduct cross-site scripting attacks, or execute arbitrary code. A heap overflow was discovered in the expat library in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit this to cause a denial of service, or execute arbitrary code. Full Article
2 Apple Security Advisory 2020-1-28-5 By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 17:16:14 GMT Apple Security Advisory 2020-1-28-5 - Safari 13.0.5 is now available and addresses address bar spoofing and password disclosure in transit issues. Full Article
2 Ubuntu Security Notice USN-4299-1 By packetstormsecurity.com Published On :: Thu, 12 Mar 2020 20:12:03 GMT Ubuntu Security Notice 4299-1 - Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, spoof the URL or other browser chrome, obtain sensitive information, bypass Content Security Policy protections, or execute arbitrary code. Various other issues were also addressed. Full Article
2 Red Hat Security Advisory 2020-1080-01 By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 22:22:22 GMT Red Hat Security Advisory 2020-1080-01 - Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Issues addressed include OpenPGP signature spoofing and certificate errors being ignored. Full Article
2 Red Hat Security Advisory 2020-1600-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:24:19 GMT Red Hat Security Advisory 2020-1600-01 - Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications. Issues addressed include a spoofing vulnerability. Full Article
2 Red Hat Security Advisory 2020-1047-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:10:20 GMT Red Hat Security Advisory 2020-1047-01 - The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network. Issues addressed include crash and out of bounds read vulnerabilities. Full Article
2 Red Hat Security Advisory 2020-1084-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:11:25 GMT Red Hat Security Advisory 2020-1084-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information. Full Article
2 Red Hat Security Advisory 2020-1167-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:12:28 GMT Red Hat Security Advisory 2020-1167-01 - Network Block Device is a protocol for accessing hard disks and other disk-like devices over the network. The nbdkit toolkit utilizes NBD to create servers with minimal dependencies. The package contains plug-in support for the C and Python programming languages. Issues addressed include a denial of service vulnerability. Full Article
2 Red Hat Security Advisory 2020-1081-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:12:38 GMT Red Hat Security Advisory 2020-1081-01 - The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol, including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base browser. Issues addressed include denial of service and null pointer vulnerabilities. Full Article
2 Red Hat Security Advisory 2020-1045-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:15:59 GMT Red Hat Security Advisory 2020-1045-01 - LFTP is a file transfer utility for File Transfer Protocol, Secure File Transfer Protocol, Hypertext Transfer Protocol, and other commonly used protocols. It uses the readline library for input, and provides support for bookmarks, built-in monitoring, job control, and parallel transfer of multiple files at the same time. Full Article
2 Gentoo Linux Security Advisory 202004-06 By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 02:51:49 GMT Gentoo Linux Security Advisory 202004-6 - A regression in GnuTLS breaks the security guarantees of the DTLS protocol. Versions less than 3.6.13 are affected. Full Article
2 Red Hat Security Advisory 2020-1318-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:30:11 GMT Red Hat Security Advisory 2020-1318-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. An arbitrary code execution vulnerability was addressed. Full Article
2 Red Hat Security Advisory 2020-1335-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:54:37 GMT Red Hat Security Advisory 2020-1335-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. An arbitrary code execution vulnerability was addressed. Full Article
2 Red Hat Security Advisory 2020-1334-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:58:34 GMT Red Hat Security Advisory 2020-1334-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. An arbitrary code execution vulnerability was addressed. Full Article
2 Red Hat Security Advisory 2020-1342-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:40:28 GMT Red Hat Security Advisory 2020-1342-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. Issues addressed include a code execution vulnerability. Full Article
2 Red Hat Security Advisory 2020-1445-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:39:41 GMT Red Hat Security Advisory 2020-1445-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.4.3 serves as a replacement for Red Hat AMQ Broker 7.4.2, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include cross site scripting, denial of service, and information leakage vulnerabilities. Full Article
2 Red Hat Security Advisory 2020-1470-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 23:09:22 GMT Red Hat Security Advisory 2020-1470-01 - The Network Time Protocol is used to synchronize a computer's time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service. Issues addressed include buffer overflow, code execution, and denial of service vulnerabilities. Full Article
2 Red Hat Security Advisory 2020-1840-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:18:54 GMT Red Hat Security Advisory 2020-1840-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include an information leakage vulnerability. Full Article
2 Red Hat Security Advisory 2020-1878-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:21:10 GMT Red Hat Security Advisory 2020-1878-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information. Full Article
2 Red Hat Security Advisory 2020-1845-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:34:31 GMT Red Hat Security Advisory 2020-1845-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Full Article
2 Red Hat Security Advisory 2020-1998-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 23:46:22 GMT Red Hat Security Advisory 2020-1998-01 - The gnutls packages provide the GNU Transport Layer Security library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. An issue was addressed where the DTLS client hello contains a random value of all zeroes. Full Article
2 TestSSL 3.0.2 By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:08:28 GMT testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets. Full Article
2 Faraday 2.6.2 By packetstormsecurity.com Published On :: Wed, 09 Aug 2017 17:22:22 GMT Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way. Full Article
2 Faraday 2.6.3 By packetstormsecurity.com Published On :: Wed, 18 Oct 2017 17:22:22 GMT Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way. Full Article
2 Faraday 2.7 By packetstormsecurity.com Published On :: Wed, 08 Nov 2017 23:52:22 GMT Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way. Full Article
2 Faraday 2.7.1 By packetstormsecurity.com Published On :: Tue, 21 Nov 2017 19:20:12 GMT Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way. Full Article
2 Faraday 2.7.2 By packetstormsecurity.com Published On :: Wed, 11 Apr 2018 16:36:43 GMT Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way. Full Article
2 Faraday 3.2 By packetstormsecurity.com Published On :: Tue, 23 Oct 2018 23:36:12 GMT Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way. Full Article
2 Faraday 3.9.2 By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 20:43:18 GMT Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way. Full Article
2 Faraday 3.10.2 By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:46:41 GMT Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way. Full Article
2 User Management System 2.0 SQL Injection By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:23:07 GMT User Management System version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass. Full Article
2 Complaint Management System 4.2 SQL Injection By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:29:20 GMT Complaint Management System version 4.2 suffers a remote SQL injection vulnerability that allows for authentication bypass. Full Article
2 Online Course Registration 2.0 SQL Injection By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 15:05:54 GMT Online Course Registration 2.0 suffers from authentication bypass and remote SQL injection vulnerabilities. Full Article
2 Geeklog 2.2.1 SQL Injection By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 15:18:37 GMT Geeklog version 2.2.1 suffers from a remote SQL injection vulnerability. Full Article
2 Open-AudIT 3.2.2 Command Injection / SQL Injection By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:39:24 GMT Open-AudIT version 3.2.2 suffers from OS command injection, arbitrary file upload, and remote SQL injection vulnerabilities. Full Article
2 YesWiki cercopitheque 2020.04.18.1 SQL Injection By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:44:02 GMT YesWiki cercopitheque version 2020.04.18.1 suffers from a remote SQL injection vulnerability. Full Article
2 Hashcat Advanced Password Recovery 4.2.0 Binary Release By packetstormsecurity.com Published On :: Fri, 03 Aug 2018 02:29:09 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
2 Hashcat Advanced Password Recovery 4.2.0 Source Code By packetstormsecurity.com Published On :: Fri, 03 Aug 2018 02:31:24 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
2 Hashcat Advanced Password Recovery 4.2.1 Binary Release By packetstormsecurity.com Published On :: Tue, 07 Aug 2018 23:55:55 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
2 Hashcat Advanced Password Recovery 4.2.1 Source Code By packetstormsecurity.com Published On :: Tue, 07 Aug 2018 23:56:22 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
2 NTCrackPipe 2.0 By packetstormsecurity.com Published On :: Wed, 12 Feb 2020 18:39:40 GMT NTCrackPipe is a basic local Windows account cracking tool. Full Article
2 Coronavirus Lockdowns: 24 Hours Of Confusion Around The World By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:37:49 GMT Full Article headline government virus science
2 OpenBSD 2.8 Announced By packetstormsecurity.com Published On :: Fri, 01 Dec 2000 12:57:57 GMT Full Article bsd
2 OpenBSD 2.9 Released By packetstormsecurity.com Published On :: Fri, 01 Jun 2001 09:38:04 GMT Full Article bsd
2 Hacker Who Blackmailed Apple In 2017 Gets No Prison Time By packetstormsecurity.com Published On :: Sat, 21 Dec 2019 06:49:02 GMT Full Article headline hacker britain fraud apple
2 Code-Cracking WW2 Bombe Operation Recreated At Bletchley By packetstormsecurity.com Published On :: Mon, 24 Sep 2018 23:34:48 GMT Full Article headline britain cyberwar germany science cryptography
2 20 Year Old Man Confesses In German Data Leak By packetstormsecurity.com Published On :: Tue, 08 Jan 2019 15:08:41 GMT Full Article headline hacker government privacy data loss germany
2 Delta Industrial Automation DCISoft 1.12.09 Stack Buffer Overflow By packetstormsecurity.com Published On :: Sun, 14 Feb 2016 01:26:22 GMT Delta Industrial Automation DCISoft version 1.12.09 suffers from a stack buffer overflow vulnerability. Full Article