is fisa2.txt By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 17:52:35 GMT From the U.S. Code Online via GPO Access [wais.access.gpo.gov] [Laws in effect as of January 16, 1996] [Document not affected by Public Laws enacted between January 16, 1996 and August 28, 1996] [CITE: 50USC] TITLE 50--WAR AND NATIONAL DEFENSE CHAPTER 36--FOREIGN INTELLIGENCE SURVEILLANCE SUBCHAPTER I--ELECTRONIC SURVEILLANCE Full Article
is Skype Squishes Cross-Zone Scripting Bug By packetstormsecurity.com Published On :: Wed, 06 Feb 2008 04:38:37 GMT Full Article voip skype
is Cisco Plugs VoIP Malware Loophole By packetstormsecurity.com Published On :: Fri, 15 Feb 2008 13:47:08 GMT Full Article malware cisco voip
is Venezualan VoIP Hacker Imprisoned By packetstormsecurity.com Published On :: Mon, 27 Sep 2010 17:33:35 GMT Full Article hacker privacy voip
is Terrorists Build Secure VoIP Over GPRS Network By packetstormsecurity.com Published On :: Tue, 01 May 2012 21:23:13 GMT Full Article headline phone voip terror
is Red Hat Security Advisory 2020-1351-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:41:56 GMT Red Hat Security Advisory 2020-1351-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability. Full Article
is Red Hat Security Advisory 2020-1378-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:04 GMT Red Hat Security Advisory 2020-1378-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability. Full Article
is Red Hat Security Advisory 2020-1352-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:20 GMT Red Hat Security Advisory 2020-1352-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Issues addressed include an out of bounds access vulnerability. Full Article
is Red Hat Security Advisory 2020-1372-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:47 GMT Red Hat Security Advisory 2020-1372-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
is Red Hat Security Advisory 2020-1358-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:43:19 GMT Red Hat Security Advisory 2020-1358-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Issues addressed include an out of bounds access vulnerability. Full Article
is Red Hat Security Advisory 2020-1403-01 By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:52:52 GMT Red Hat Security Advisory 2020-1403-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability. Full Article
is Red Hat Security Advisory 2020-1460-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:40:41 GMT Red Hat Security Advisory 2020-1460-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. BR/EDR encryption key negotiation attacks were addressed. Full Article
is Red Hat Security Advisory 2020-1473-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 23:02:22 GMT Red Hat Security Advisory 2020-1473-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
is Red Hat Security Advisory 2020-1465-01 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 00:12:24 GMT Red Hat Security Advisory 2020-1465-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
is Red Hat Security Advisory 2020-1493-01 By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:34:41 GMT Red Hat Security Advisory 2020-1493-01 - The kernel-alt packages provide the Linux kernel version 4.x. Issues addressed include buffer overflow, denial of service, heap overflow, and null pointer vulnerabilities. Full Article
is Red Hat Security Advisory 2020-1505-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:53:17 GMT Red Hat Security Advisory 2020-1505-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. An out-of-bounds heap access vulnerability was addressed. Full Article
is Red Hat Security Advisory 2020-1524-01 By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:10:47 GMT Red Hat Security Advisory 2020-1524-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
is Red Hat Security Advisory 2020-1769-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:19:01 GMT Red Hat Security Advisory 2020-1769-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, information leakage, integer overflow, null pointer, out of bounds read, and use-after-free vulnerabilities. Full Article
is Red Hat Security Advisory 2020-1966-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:56:45 GMT Red Hat Security Advisory 2020-1966-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
is Qualys Security Advisory - OpenBSD Authentication Bypass / Privilege Escalation By packetstormsecurity.com Published On :: Thu, 05 Dec 2019 21:08:17 GMT Qualys has discovered that OpenBSD suffers from multiple authentication bypass and local privilege escalation vulnerabilities. Full Article
is Qualys Security Advisory - OpenBSD Dynamic Loader Privilege Escalation By packetstormsecurity.com Published On :: Thu, 12 Dec 2019 13:39:44 GMT Qualys discovered a local privilege escalation in OpenBSD's dynamic loader (ld.so). This vulnerability is exploitable in the default installation (via the set-user-ID executable chpass or passwd) and yields full root privileges. They developed a simple proof of concept and successfully tested it against OpenBSD 6.6 (the current release), 6.5, 6.2, and 6.1, on both amd64 and i386; other releases and architectures are probably also exploitable. Full Article
is OpenSMTPD Local Information Disclosure By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:29:54 GMT Qualys discovered a minor vulnerability in OpenSMTPD, OpenBSD's mail server. An unprivileged local attacker can read the first line of an arbitrary file (for example, root's password hash in /etc/master.passwd) or the entire contents of another user's file (if this file and /var/spool/smtpd/ are on the same filesystem). A proof of concept exploit is included in this archive. Full Article
is Microsoft Is Not Comfortable Storing Data In Australia By packetstormsecurity.com Published On :: Wed, 27 Mar 2019 14:49:43 GMT Full Article headline government privacy microsoft australia cryptography
is Hackers Claim RFID Smart-Card Hack, But Vendor Disagrees By packetstormsecurity.com Published On :: Wed, 05 Mar 2008 08:16:12 GMT Full Article hacker rfid
is Mythbusters RFID Episode Axed After Pressure From Credit Card Firms By packetstormsecurity.com Published On :: Wed, 03 Sep 2008 00:43:56 GMT Full Article bank rfid
is Are RFID Chips A Personal Security Risk? By packetstormsecurity.com Published On :: Mon, 29 Sep 2008 13:42:53 GMT Full Article rfid
is European Commission Launches New Industry Guidelines On RFID Privacy By packetstormsecurity.com Published On :: Thu, 07 Apr 2011 05:05:29 GMT Full Article headline rfid
is Texas School District To Track Kids Through RFID Tags By packetstormsecurity.com Published On :: Sat, 26 May 2012 15:03:03 GMT Full Article headline government privacy usa rfid
is Hacking RFID Tags Is Easier Than You Think By packetstormsecurity.com Published On :: Fri, 02 Aug 2013 14:34:42 GMT Full Article headline hacker wireless rfid conference
is Microsoft In More Hacking Misery By packetstormsecurity.com Published On :: Tue, 21 Jan 2014 16:24:20 GMT Full Article headline hacker microsoft flaw syria
is Hacktivists Dish Out DNS Hijack To PayPal, eBay By packetstormsecurity.com Published On :: Tue, 04 Feb 2014 00:00:19 GMT Full Article headline hacker dns ebay syria
is SEA Screws With Facebook's WHOIS Via Mark Monitor By packetstormsecurity.com Published On :: Thu, 06 Feb 2014 16:07:44 GMT Full Article headline hacker dns facebook syria
is Forbes.com Gets A Million Accounts Compromised By packetstormsecurity.com Published On :: Tue, 18 Feb 2014 04:24:22 GMT Full Article headline hacker data loss password syria
is Taboola Hack Allows SEA To Redirect Reuters Site Visitors By packetstormsecurity.com Published On :: Tue, 24 Jun 2014 01:30:40 GMT Full Article headline hacker flaw syria
is Study: Hack Attack Aimed At ISIS' Opposition By packetstormsecurity.com Published On :: Sat, 20 Dec 2014 15:56:54 GMT Full Article headline cyberwar iraq terror syria
is Russian Plane Crash Possibly Fault Of ISIS Bomb By packetstormsecurity.com Published On :: Thu, 05 Nov 2015 00:55:41 GMT Full Article headline russia terror syria
is Anonymous Becomes Peacemaker As Hacktivists Battle By packetstormsecurity.com Published On :: Tue, 05 Mar 2013 06:52:36 GMT Full Article headline anonymous malaysia philippines
is Mozilla's Firefox 70 Is Out: Privacy Reports Reveal Whose Cookies Are Tracking You By packetstormsecurity.com Published On :: Wed, 23 Oct 2019 18:24:33 GMT Full Article headline privacy spyware mozilla
is Secunia Security Advisory 50313 By packetstormsecurity.com Published On :: Wed, 22 Aug 2012 06:23:11 GMT Secunia Security Advisory - A vulnerability has been reported in CuteSoft Cute Editor for ASP.NET, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
is ASP Forums 2.1 Database Disclosure By packetstormsecurity.com Published On :: Sat, 06 Feb 2016 09:02:22 GMT ASP Forums version 2.1 suffers from a database disclosure vulnerability. Full Article
is ASP Webshell For IIS 8 By packetstormsecurity.com Published On :: Thu, 12 May 2016 06:45:33 GMT ASP webshell backdoor designed specifically for IIS 8. Full Article
is ASP Gateway 1.0.0 Database Disclosure By packetstormsecurity.com Published On :: Mon, 31 Oct 2016 03:33:33 GMT ASP Gateway 1.0.0 suffers from a database disclosure vulnerability. Full Article
is ZyXEL P-660HN-T1 V2 Missing Authentication / Password Disclosure By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:27:39 GMT The ZyXEL P-660HN-T1 V2 rpWLANRedirect.asp page is missing authentication and discloses an administrator password. Full Article
is Defending Islam, Hacker Defaces Thousands Of Dutch Websites By packetstormsecurity.com Published On :: Thu, 28 Aug 2008 21:37:30 GMT Full Article hacker netherlands
is Dutch Courts: Wi-Fi Hacking Is Not A Crime By packetstormsecurity.com Published On :: Mon, 21 Mar 2011 15:27:12 GMT Full Article headline hacker wireless netherlands
is Egyptian Government Caught Tracking Opponents And Activists By packetstormsecurity.com Published On :: Fri, 04 Oct 2019 13:47:48 GMT Full Article headline government privacy phone spyware egypt
is Three Suspects Arrested In Maltese Bank Cyber Heist By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:28:08 GMT Full Article headline hacker bank cybercrime fraud
is Sneaky Malware Disguises Itself As An Adobe Flash Installer By packetstormsecurity.com Published On :: Tue, 09 Jan 2018 16:57:35 GMT Full Article headline malware adobe
is Microsoft Culls Secret Flash Whitelist After Google Points Out Its Insecurity By packetstormsecurity.com Published On :: Thu, 21 Feb 2019 16:47:46 GMT Full Article headline malware microsoft google adobe
is Microsoft Taps Eric Holder To Audit AnyVision Face Recognition By packetstormsecurity.com Published On :: Sat, 16 Nov 2019 15:35:09 GMT Full Article headline microsoft fraud