ed Red Hat Security Advisory 2020-1938-01 By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:29:03 GMT Red Hat Security Advisory 2020-1938-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Full Article
ed Red Hat Security Advisory 2020-2014-01 By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:04:44 GMT Red Hat Security Advisory 2020-2014-01 - SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Full Article
ed Latin America Becoming Newest Malware Hotbed By packetstormsecurity.com Published On :: Fri, 03 May 2013 14:50:16 GMT Full Article headline malware cyberwar venezuela brazil scada
ed Edward Snowden Pens An Open Letter To The People Of Brazil By packetstormsecurity.com Published On :: Tue, 17 Dec 2013 16:10:05 GMT Full Article headline government usa russia spyware brazil nsa
ed 100,000 Home Routers Recruited To Spread Brazilian Hacking Scam By packetstormsecurity.com Published On :: Tue, 02 Oct 2018 14:13:41 GMT Full Article headline hacker malware fraud brazil
ed Presidential Race In Brazil Marred By WhatsApp Scandal By packetstormsecurity.com Published On :: Fri, 19 Oct 2018 13:04:45 GMT Full Article headline government privacy phone facebook brazil
ed Over Half Of Brazil's Population Exposed In Security Incident By packetstormsecurity.com Published On :: Thu, 13 Dec 2018 17:18:47 GMT Full Article headline privacy amazon data loss brazil
ed Cartoon Network Hacked Worldwide To Show Brazilian Stripper Videos By packetstormsecurity.com Published On :: Thu, 02 May 2019 01:39:03 GMT Full Article headline hacker brazil
ed Telegram Voicemail Hack Used Against Brazil's President, Ministers By packetstormsecurity.com Published On :: Fri, 26 Jul 2019 15:54:32 GMT Full Article headline hacker government phone spyware brazil
ed Brazil Prosecutes Greenwald In Attack On Press Freedom By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 15:57:40 GMT Full Article headline government data loss brazil
ed Phrack - Viewer Discretion Advised - (De)coding An iOS Kernel Vulnerability By packetstormsecurity.com Published On :: Tue, 30 Oct 2018 12:22:22 GMT Phrack Viewer Discretion Advised write up called (De)coding an iOS Kernel Vulnerability. Full Article
ed Red Hat Security Advisory 2020-1000-01 By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 18:22:22 GMT Red Hat Security Advisory 2020-1000-01 - The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format. A heap-based overflow was addressed. Full Article
ed Red Hat Security Advisory 2020-1289-01 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:47:19 GMT Red Hat Security Advisory 2020-1289-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include an out of bounds write vulnerability. Full Article
ed Red Hat Security Advisory 2020-1290-01 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 15:00:03 GMT Red Hat Security Advisory 2020-1290-01 - HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high availability environments. Issues addressed include an out of bounds write vulnerability. Full Article
ed Red Hat Security Advisory 2020-1288-01 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 15:00:14 GMT Red Hat Security Advisory 2020-1288-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include an out of bounds write vulnerability. Full Article
ed Red Hat Security Advisory 2020-1702-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:27:31 GMT Red Hat Security Advisory 2020-1702-01 - The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format. Issues addressed include a heap overflow vulnerability. Full Article
ed NSA Hacking Tools Used Against Nuke, Aerospace Worlds By packetstormsecurity.com Published On :: Mon, 22 Oct 2018 14:35:34 GMT Full Article headline hacker government usa space data loss cyberwar nsa scada
ed Russian Malware Used In An Attempt To Sabotage Saudi Petrol Plant By packetstormsecurity.com Published On :: Wed, 24 Oct 2018 14:14:11 GMT Full Article headline hacker malware russia cyberwar saudi arabia scada
ed Data Leak Revealed At South Africa's Main Electricity Provider By packetstormsecurity.com Published On :: Wed, 06 Feb 2019 13:58:54 GMT Full Article headline hacker data loss africa scada
ed Half Of Industrial Control System Networks Have Faced Cyber Attacks, Say Security Researchers By packetstormsecurity.com Published On :: Wed, 27 Mar 2019 14:49:32 GMT Full Article headline hacker cyberwar scada
ed Denial Of Service Event Impacted U.S. Power Utility Last Month By packetstormsecurity.com Published On :: Fri, 03 May 2019 22:59:30 GMT Full Article headline usa denial of service cyberwar scada
ed New Ransomware Doesn't Just Encrypt Data. It Also Meddles With Critical Infrastructure By packetstormsecurity.com Published On :: Tue, 04 Feb 2020 14:39:11 GMT Full Article headline malware scada cryptography
ed Aastra IP Telephone Hardcoded Password By packetstormsecurity.com Published On :: Mon, 08 Apr 2013 20:22:22 GMT The Aastra 6753i IP Telephone suffers from a hardcoded telnetd administrative password. Full Article
ed Federal Officials Are Using Your Cellphone Data To Respond To The Outbreak By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:32:51 GMT Full Article headline government privacy usa virus phone
ed Dr. Anthony Fauci Forced To Beef Up Security As Death Threats Increase By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 13:49:47 GMT Full Article headline government usa virus
ed Trump Administration's Lack Of A Unified Coronavirus Strategy Will Cost Lives, A Dozen Experts Say By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:05 GMT Full Article headline government usa virus
ed Facebook Must Face Renewed Privacy Lawsuit Over User Tracking By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 16:10:11 GMT Full Article headline government privacy usa facebook
ed The CFAA Is Finally Being Reviewed By The Supreme Court By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:43:16 GMT Full Article headline hacker government usa
ed DevSecOps: A Secured Approach By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:35:06 GMT Whitepaper called DevSecOps: A Secure Approach. Full Article
ed Running Encrypted ELF Binaries In Memory By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:45:14 GMT Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project. Full Article
ed CarolinaCon Has Been Postponed By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:12:21 GMT CarolinaCon, which was to be hosted in Charlotte at the Embassy Suites April 10th through the 11th, 2020, has been postponed due to COVID-19. Full Article
ed Hackers 2 Hackers Conference 17th Edition Call For Papers By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 19:22:22 GMT The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020. Full Article
ed From Zero Credentials To Full Domain Compromise By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 14:19:17 GMT Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials. Full Article
ed Packet Storm Exploit 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 02:59:49 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
ed Packet Storm Advisory 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 03:12:44 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
ed Packet Storm Exploit 2013-0819-1 - Oracle Java BytePackedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:28:12 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
ed Packet Storm Advisory 2013-0819-1 - Oracle Java BytePackedRaster.verify() By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:33:00 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
ed Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access By packetstormsecurity.com Published On :: Tue, 26 Nov 2013 01:52:43 GMT This Metasploit module exploits a vulnerability on Microsoft Silverlight. The vulnerability exists on the Initialize() method from System.Windows.Browser.ScriptObject, which access memory in an unsafe manner. Since it is accessible for untrusted code (user controlled) it's possible to dereference arbitrary memory which easily leverages to arbitrary code execution. In order to bypass DEP/ASLR a second vulnerability is used, in the public WriteableBitmap class from System.Windows.dll. This Metasploit module has been tested successfully on IE6 - IE10, Windows XP SP3 / Windows 7 SP1 on both x32 and x64 architectures. Full Article
ed Triologic Media Player 8 Buffer Overflow By packetstormsecurity.com Published On :: Sat, 04 Apr 2020 18:32:22 GMT Triologic Media Player version 8 suffers from a .m3l local buffer overflow vulnerability. Full Article
ed WordPress Media Library Assistant 2.81 Local File Inclusion By packetstormsecurity.com Published On :: Mon, 13 Apr 2020 11:01:11 GMT WordPress Media Library Assistant plugin version 2.81 suffers from a local file inclusion vulnerability. Full Article
ed QRadar Community Edition 7.3.1.6 Insecure File Permissions By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:09:24 GMT QRadar Community Edition version 7.3.1.6 suffers from a local privilege escalation due to insecure file permissions with run-result-reader.sh. Full Article
ed Red Hat Security Advisory 2020-1449-01 By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:20:29 GMT Red Hat Security Advisory 2020-1449-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. A local file overwrite vulnerability was addressed. Full Article
ed Ivanti Workspace Control Registry Stored Credentials By packetstormsecurity.com Published On :: Mon, 01 Oct 2018 17:33:45 GMT A flaw was found in Workspace Control that allows a local unprivileged user to retrieve the database or Relay server credentials from the Windows Registry. These credentials are encrypted, however the encryption that is used is reversible. This issue was successfully verified on Ivanti Workspace Control version 10.2.700.1 and 10.2.950.0. Full Article
ed Red Hat Security Advisory 2019-2766-01 By packetstormsecurity.com Published On :: Thu, 12 Sep 2019 20:40:57 GMT Red Hat Security Advisory 2019-2766-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains updated container images for multus-cni, operator-lifecycle-manager, and operator-registry in Red Hat OpenShift Container Platform 4.1.15. Each of these container images includes gRPC, which has been updated with the fixes for unbounded memory growth issues. Full Article
ed Trend Micro Security 2019 Security Bypass Protected Service Tampering By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:42:02 GMT Trend Micro Maximum Security is vulnerable to arbitrary code execution as it allows for creation of registry key to target a process running as SYSTEM. This can allow a malware to gain elevated privileges to take over and shutdown services that require SYSTEM privileges like Trend Micros "Asmp" service "coreServiceShell.exe" which does not allow Administrators to tamper with them. This could allow an attacker or malware to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. Note administrator privileges are required to exploit this vulnerability. Full Article
ed NSClient++ 0.5.2.35 Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:03:42 GMT NSClient++ version 0.5.2.35 suffers from an authenticated remote code execution vulnerability. Full Article
ed Edimax EW-7438RPn 1.13 Remote Code Execution By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:36:26 GMT Edimax EW-7438RPn version 1.13 suffers from a remote code execution vulnerability. Full Article
ed Red Hat Security Advisory 2020-1635-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:28:35 GMT Red Hat Security Advisory 2020-1635-01 - The GNU Debugger allows users to debug programs written in various programming languages including C, C++, and Fortran. Issues addressed include buffer overflow and code execution vulnerabilities. Full Article
ed Red Hat Security Advisory 2020-1716-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:30:55 GMT Red Hat Security Advisory 2020-1716-01 - The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Issues addressed include a code execution vulnerability. Full Article
ed Telegram DDoS Attack Launched Mostly From China By packetstormsecurity.com Published On :: Mon, 17 Jun 2019 14:40:50 GMT Full Article headline china denial of service social