is Red Hat Security Advisory 2019-2028-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 20:58:01 GMT Red Hat Security Advisory 2019-2028-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and traversal vulnerabilities. Full Article
is Red Hat Security Advisory 2019-2466-01 By packetstormsecurity.com Published On :: Tue, 13 Aug 2019 14:33:46 GMT Red Hat Security Advisory 2019-2466-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. An improper authorization issue was addressed. Full Article
is Red Hat Security Advisory 2019-2565-01 By packetstormsecurity.com Published On :: Tue, 27 Aug 2019 13:30:34 GMT Red Hat Security Advisory 2019-2565-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. An OpenSSL issue was addressed where an X509 name equality check did not work correctly. Full Article
is Red Hat Security Advisory 2019-2587-01 By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 14:07:44 GMT Red Hat Security Advisory 2019-2587-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. Issues addressed include code execution and denial of service vulnerabilities. Full Article
is Red Hat Security Advisory 2019-2806-01 By packetstormsecurity.com Published On :: Thu, 19 Sep 2019 16:27:44 GMT Red Hat Security Advisory 2019-2806-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include a code execution vulnerability. Full Article
is Red Hat Security Advisory 2019-4201-01 By packetstormsecurity.com Published On :: Fri, 13 Dec 2019 01:28:02 GMT Red Hat Security Advisory 2019-4201-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. Issues addressed include a denial of service vulnerability. Full Article
is Debian Security Advisory 4587-1 By packetstormsecurity.com Published On :: Tue, 17 Dec 2019 15:42:32 GMT Debian Linux Security Advisory 4587-1 - Several vulnerabilities have been discovered in the interpreter for the Ruby language, which could result in unauthorized access by bypassing intended path matchings, denial of service, or the execution of arbitrary code. Full Article
is Debian Security Advisory 4586-1 By packetstormsecurity.com Published On :: Tue, 17 Dec 2019 15:42:38 GMT Debian Linux Security Advisory 4586-1 - Several vulnerabilities have been discovered in the interpreter for the Ruby language, which could result in unauthorized access by bypassing intended path matchings, denial of service, or the execution of arbitrary code. Full Article
is Red Hat Security Advisory 2020-0542-01 By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 15:07:18 GMT Red Hat Security Advisory 2020-0542-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and traversal vulnerabilities. Full Article
is Red Hat Security Advisory 2020-0588-01 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:17:25 GMT Red Hat Security Advisory 2020-0588-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. A remote code execution vulnerability has been addressed. Full Article
is Red Hat Security Advisory 2020-0589-01 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:18:00 GMT Red Hat Security Advisory 2020-0589-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. A remote code execution vulnerability has been addressed. Full Article
is Red Hat Security Advisory 2020-0591-01 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:23:22 GMT Red Hat Security Advisory 2020-0591-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and traversal vulnerabilities. Full Article
is Red Hat Security Advisory 2020-0663-01 By packetstormsecurity.com Published On :: Tue, 03 Mar 2020 16:33:42 GMT Red Hat Security Advisory 2020-0663-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and traversal vulnerabilities. Full Article
is Gentoo Linux Security Advisory 202003-06 By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:58:36 GMT Gentoo Linux Security Advisory 202003-6 - Multiple vulnerabilities have been found in Ruby, the worst of which could lead to the remote execution of arbitrary code. Versions less than 2.4.9:2.4 are affected. Full Article
is Gentoo Linux Security Advisory 202003-09 By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:08:19 GMT Gentoo Linux Security Advisory 202003-9 - A vulnerability in OpenID library for Ruby at worst might allow an attacker to bypass authentication. Versions less than 2.9.2 are affected. Full Article
is Tampa Mayor's Twitter Hacked, Used To Send Missile Threats By packetstormsecurity.com Published On :: Fri, 22 Feb 2019 01:03:30 GMT Full Article headline hacker government twitter terror
is Swedish Social Democrats' Twitter Account Hacked By packetstormsecurity.com Published On :: Tue, 16 Apr 2019 22:07:32 GMT Full Article headline hacker government sweden social twitter
is US To Demand Five Years Of Your Social Media, Email Account Info In Your Visa Application By packetstormsecurity.com Published On :: Mon, 03 Jun 2019 14:09:54 GMT Full Article headline government privacy usa facebook social twitter terror
is Twitter Sold User Security Information To Advertisers By packetstormsecurity.com Published On :: Wed, 09 Oct 2019 14:05:25 GMT Full Article headline privacy data loss twitter
is Former Twitter Employees Charged With Spying On Users For Saudis By packetstormsecurity.com Published On :: Thu, 07 Nov 2019 14:51:02 GMT Full Article headline government cybercrime fraud spyware social saudi arabia twitter
is Secunia Security Advisory 30197 By packetstormsecurity.com Published On :: Mon, 12 May 2008 22:24:40 GMT Secunia Security Advisory - Some vulnerabilities have been reported in Microsoft Windows CE, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Article
is Windows Vista/7 lpksetup.exe DLL Hijacking By packetstormsecurity.com Published On :: Wed, 27 Oct 2010 01:49:35 GMT Microsoft Windows Vista/7 suffers from a DLL hijacking vulnerability in lpksetup.exe. Full Article
is Windows Vista/7 UAC Bypass Exploit By packetstormsecurity.com Published On :: Wed, 24 Nov 2010 22:52:18 GMT Microsoft Windows Vista / 7 privilege escalation exploit that has UAC bypass. Full Article
is Microsoft Windows Vista/Server 2008 nsiproxy.sys Denial Of Service By packetstormsecurity.com Published On :: Wed, 18 May 2011 09:09:09 GMT Microsoft Windows Vista/Server 2008 nsiproxy.sys local kernel denial of service exploit. Full Article
is DVD X Player 5.5 .plf PlayList Buffer Overflow By packetstormsecurity.com Published On :: Fri, 02 Sep 2011 15:22:44 GMT This Metasploit module exploits a stack-based buffer overflow on DVD X Player 5.5 Pro and Standard. By supplying a long string of data in a plf file (playlist), the MediaPlayerCtrl.dll component will attempt to extract a filename out of the string, and then copy it on the stack without any proper bounds checking, which causes a buffer overflow, and results arbitrary code execution under the context of the user. This Metasploit module has been designed to target common Windows systems such as: Windows XP SP2/SP3, Windows Vista, and Windows 7. Full Article
is Mandriva Linux Security Advisory 2012-081 By packetstormsecurity.com Published On :: Thu, 24 May 2012 15:20:53 GMT Mandriva Linux Security Advisory 2012-081 - Security issues were identified and fixed in mozilla firefox. Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Using the Address Sanitizer tool, security researcher Aki Helin from OUSPG found that IDBKeyRange of indexedDB remains in the XPConnect hashtable instead of being unlinked before being destroyed. Security research firm iDefense reported that researcher wushi of team509 discovered a memory corruption on Windows Vista and Windows 7 systems with hardware acceleration disabled or using incompatible video drivers. Various other issues have also been addressed. Full Article
is 160,000 Nintendo Accounts Were Compromised By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:32:18 GMT Full Article headline hacker privacy data loss nintendo password
is San Francisco Trial Of LinkedIn Hacker Stalled Again By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:28:24 GMT Full Article headline hacker government privacy usa data loss social
is Search Provider Algolia Discloses Security Incident By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:31:10 GMT Full Article headline hacker privacy data loss flaw
is Turkish Hacker Defaces Kiwi Parliament Website By packetstormsecurity.com Published On :: Mon, 20 Sep 2010 01:09:00 GMT Full Article hacker government turkey
is Turkish Hackers Attack CDU Websites By packetstormsecurity.com Published On :: Tue, 19 Oct 2010 16:57:16 GMT Full Article hacker turkey
is Anonymous Pwns 74 Turkish Government Sites By packetstormsecurity.com Published On :: Fri, 08 Jul 2011 13:30:53 GMT Full Article headline government turkey anonymous
is Turkish Net Hijack Hits Big Name Websites By packetstormsecurity.com Published On :: Mon, 05 Sep 2011 14:28:05 GMT Full Article headline hacker israel turkey
is Thousands Of Turkish Twitter OAuth Tokens Leaked By packetstormsecurity.com Published On :: Tue, 20 Aug 2013 15:10:32 GMT Full Article headline hacker data loss flaw turkey social twitter
is Turkey Approves Legislation To Block Internet Sites By packetstormsecurity.com Published On :: Thu, 06 Feb 2014 16:07:49 GMT Full Article headline government turkey facebook twitter anonymous censorship
is Turkey Twitter Ban Is A Losing Battle, Expert Claims By packetstormsecurity.com Published On :: Mon, 24 Mar 2014 15:12:13 GMT Full Article headline government turkey twitter censorship
is Twitter Still Blocked Despite Turkish Court Ruling By packetstormsecurity.com Published On :: Thu, 03 Apr 2014 15:08:02 GMT Full Article headline government turkey twitter censorship
is Turkish Hacker Receives Record 334 Years In Prison Over Data Theft By packetstormsecurity.com Published On :: Wed, 13 Jan 2016 02:42:42 GMT Full Article headline hacker cybercrime fraud identity theft turkey
is Turkish Authorities Block Wikipedia Without Giving Reason By packetstormsecurity.com Published On :: Mon, 01 May 2017 15:47:57 GMT Full Article headline government turkey censorship
is US Is Out Of The Picture In Syria-Turkey Crisis. Putin Now Owns This Mess. By packetstormsecurity.com Published On :: Sun, 20 Oct 2019 15:56:43 GMT Full Article headline government usa russia turkey syria military
is Solaris 11.4 xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 15:03:23 GMT Solaris version 11.4 xscreensaver local privilege escalation exploit. Full Article
is Solaris xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 23 Oct 2019 20:15:30 GMT This Metasploit module exploits a vulnerability in xscreensaver versions since 5.06 on unpatched Solaris 11 systems which allows users to gain root privileges. xscreensaver allows users to create a user-owned file at any location on the filesystem using the -log command line argument introduced in version 5.06. This module uses xscreensaver to create a log file in /usr/lib/secure/, overwrites the log file with a shared object, and executes the shared object using the LD_PRELOAD environment variable. This module has been tested successfully on xscreensaver version 5.15 on Solaris 11.1 (x86) and xscreensaver version 5.15 on Solaris 11.3 (x86). Full Article
is Solaris xlock Information Disclosure By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:38:33 GMT A low impact information disclosure vulnerability in the setuid root xlock binary distributed with Solaris may allow local users to read partial contents of sensitive files. Due to the fact that target files must be in a very specific format, exploitation of this flaw to escalate privileges in a realistic scenario is unlikely. Full Article
is Oracle Solaris 11.x / 10 whodo / w Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:38:30 GMT A difficult to exploit heap-based buffer overflow in setuid root whodo and w binaries distributed with Solaris allows local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges. Full Article
is COVERT-2000-07.listserv By packetstormsecurity.com Published On :: Wed, 26 Jul 2000 00:22:33 GMT Network Associates COVERT Labs Security Advisory - The L-Soft LISTSERV web archive (wa,wa.exe) component contains an unchecked buffer allowing remote execution of arbitrary code with the privileges of the LISTSERV daemon. Vulnerable systems include L-Soft LISTSERV Web Archives 1.8d (confirmed) and 1.8c (inferred) for Windows 9x, Windows NT 3.5x, Windows NT 4.0, Windows 2000, UNIX (all vendors), and OpenVMS VAX. Full Article
is The Internet Is Not Ready For DNS SEC By packetstormsecurity.com Published On :: Fri, 29 Sep 2017 14:32:04 GMT Full Article headline dns cryptography
is Vast Majority Of Newly Registered Domains Are Malicious By packetstormsecurity.com Published On :: Thu, 22 Aug 2019 15:44:39 GMT Full Article headline dns cybercrime fraud
is Why Big ISPs Aren't Happy About Google's Plans For Encrypted DNS By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 13:50:11 GMT Full Article headline privacy dns google
is Firefox Turns On Encrypted DNS By Default To Thwart Snooping ISPs By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:00:05 GMT Full Article headline privacy dns mozilla firefox cryptography
is Debian Security Advisory 4457-1 By packetstormsecurity.com Published On :: Fri, 07 Jun 2019 23:22:22 GMT Debian Linux Security Advisory 4457-1 - Hanno Böck discovered that Evolution was vulnerable to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted HTML email. This issue was mitigated by moving the security bar with encryption and signature information above the message headers. Full Article