it Botan C++ Crypto Algorithms Library 2.11.0 By packetstormsecurity.com Published On :: Mon, 01 Jul 2019 15:32:42 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
it Botan C++ Crypto Algorithms Library 2.12.0 By packetstormsecurity.com Published On :: Mon, 07 Oct 2019 15:02:16 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
it Botan C++ Crypto Algorithms Library 2.12.1 By packetstormsecurity.com Published On :: Mon, 14 Oct 2019 15:16:36 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
it Botan C++ Crypto Algorithms Library 2.13.0 By packetstormsecurity.com Published On :: Mon, 06 Jan 2020 17:14:06 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
it Botan C++ Crypto Algorithms Library 2.14.0 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:22:31 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
it Red Hat Security Advisory 2020-1797-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:19:47 GMT Red Hat Security Advisory 2020-1797-01 - The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Issues addressed include denial of service, integer overflow, and out of bounds read vulnerabilities. Full Article
it Red Hat Security Advisory 2020-1787-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:28:03 GMT Red Hat Security Advisory 2020-1787-01 - The unzip utility is used to list, test, and extract files from zip archives. Issues addressed include a denial of service vulnerability. Full Article
it Red Hat Security Advisory 2020-1665-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:30:08 GMT Red Hat Security Advisory 2020-1665-01 - Qt is a software toolkit for developing applications. The qt5-base packages contain base tools for string, xml, and network handling in Qt. Issues addressed include a denial of service vulnerability. Full Article
it Red Hat Security Advisory 2020-1581-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:30:46 GMT Red Hat Security Advisory 2020-1581-01 - WavPack is a completely open audio compression format providing lossless, high-quality lossy, and a unique hybrid compression mode. Issues addressed include denial of service and out of bounds read vulnerabilities. Full Article
it Red Hat Security Advisory 2020-1659-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:40:11 GMT Red Hat Security Advisory 2020-1659-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB and OpenTSDB. Issues addressed include a denial of service vulnerability. Full Article
it OpenSSL signature_algorithms_cert Denial Of Service By packetstormsecurity.com Published On :: Fri, 01 May 2020 19:22:22 GMT Proof of concept denial of service exploit for the recent OpenSSL signature_algorithms_cert vulnerability. Full Article
it EU Considers Facial Recognition Ban By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:27:22 GMT Full Article headline government privacy password spyware
it Amazon Engineer Leaks Encryption Keys To Public GitHub Repo By packetstormsecurity.com Published On :: Thu, 23 Jan 2020 16:22:30 GMT Full Article headline hacker amazon data loss password
it Apple Joins FIDO Alliance, Commits To Getting Rid Of Passwords By packetstormsecurity.com Published On :: Wed, 12 Feb 2020 18:13:41 GMT Full Article headline password apple
it (On-Premises Only) Security advisory for Simulation Process Intelligence (3DOrchestrate Services) on 3DEXPERIENCE: March 11th, 2020 By www.3ds.com Published On :: Tue, 10 Mar 2020 11:04:49 +0100 A vulnerability associated with Use of Hard-coded Credentials (CWE-798) exists in Simulation Process Intelligence (3DOrchestrate Services) on premises licensed program. The security risk is evaluated as High (CVSS v.3.0 Base Score 8.0) and affects all 3DEXPERIENCE releases (from 3DEXPERIENCE R2014x to 3DEXPERIENCE R2020x). Full Article 3DEXPERIENCE 3DEXPERIENCE 3DEXPERIENCE R2014x 3DEXPERIENCE R2015x 3DEXPERIENCE R2016x 3DEXPERIENCE R2017x 3DEXPERIENCE R2018x 3DEXPERIENCE R2019x
it Bluetooth Exploit Can Track And Identify Mobile Device Users By packetstormsecurity.com Published On :: Wed, 17 Jul 2019 13:08:25 GMT Full Article headline privacy wireless spyware
it New Attack Exploiting Bluetooth Weakness Intercepts Data By packetstormsecurity.com Published On :: Sat, 17 Aug 2019 17:56:28 GMT Full Article headline privacy wireless data loss flaw
it litestep.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:57:32 GMT --------------------------- Full Article
it SkypeFinds Another Security Snafu By packetstormsecurity.com Published On :: Fri, 01 Feb 2008 11:42:41 GMT Full Article voip
it Security Hack Allows VoIP Aboard Airlines By packetstormsecurity.com Published On :: Mon, 25 Aug 2008 14:29:24 GMT Full Article voip
it Skype Admits Privacy Violation In China By packetstormsecurity.com Published On :: Thu, 02 Oct 2008 09:58:16 GMT Full Article privacy china voip skype
it Chinese Skype Software Secretly Logs Political Chat Messages By packetstormsecurity.com Published On :: Thu, 02 Oct 2008 16:34:11 GMT Full Article government china voip skype
it Italy Police Warn Of Skype Threat By packetstormsecurity.com Published On :: Sat, 14 Feb 2009 00:08:41 GMT Full Article government voip skype italy
it Fugitive Hacker Indicted For Running VoIP Scam By packetstormsecurity.com Published On :: Wed, 18 Feb 2009 06:01:12 GMT Full Article hacker government cybercrime scam voip
it VoIP Hack Suspect Fugitive Extradited Back To US By packetstormsecurity.com Published On :: Mon, 19 Oct 2009 02:29:15 GMT Full Article usa voip
it Fugitive VoIP Hacker Admits 10 Million Minute Spree By packetstormsecurity.com Published On :: Wed, 03 Feb 2010 16:58:09 GMT Full Article hacker voip
it Hacker Admits Stealing, Reselling VoIP Services By packetstormsecurity.com Published On :: Thu, 04 Feb 2010 14:15:02 GMT Full Article hacker voip
it Google And Skype Could Be Hit By India Data Curbs By packetstormsecurity.com Published On :: Tue, 31 Aug 2010 15:56:40 GMT Full Article india google voip skype
it Bro Network Security Monitor 2.6.3 By packetstormsecurity.com Published On :: Fri, 09 Aug 2019 20:33:35 GMT Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
it Bro Network Security Monitor 2.6.4 By packetstormsecurity.com Published On :: Wed, 28 Aug 2019 23:57:22 GMT Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
it Hackers Are Selling A Critical Zoom Zero-Day Exploit For $500,000 By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:30:36 GMT Full Article headline hacker flaw
it How To Hack A Company By Circumventing Its WAF For Fun And Profit - Part 2 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:35:24 GMT Full Article headline hacker flaw
it Red Hat Security Advisory 2020-1351-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:41:56 GMT Red Hat Security Advisory 2020-1351-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability. Full Article
it Red Hat Security Advisory 2020-1378-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:04 GMT Red Hat Security Advisory 2020-1378-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability. Full Article
it Red Hat Security Advisory 2020-1352-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:20 GMT Red Hat Security Advisory 2020-1352-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Issues addressed include an out of bounds access vulnerability. Full Article
it Red Hat Security Advisory 2020-1372-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:47 GMT Red Hat Security Advisory 2020-1372-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
it Red Hat Security Advisory 2020-1358-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:43:19 GMT Red Hat Security Advisory 2020-1358-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Issues addressed include an out of bounds access vulnerability. Full Article
it Red Hat Security Advisory 2020-1403-01 By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:52:52 GMT Red Hat Security Advisory 2020-1403-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability. Full Article
it Red Hat Security Advisory 2020-1460-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:40:41 GMT Red Hat Security Advisory 2020-1460-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. BR/EDR encryption key negotiation attacks were addressed. Full Article
it Red Hat Security Advisory 2020-1473-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 23:02:22 GMT Red Hat Security Advisory 2020-1473-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
it Red Hat Security Advisory 2020-1465-01 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 00:12:24 GMT Red Hat Security Advisory 2020-1465-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
it Red Hat Security Advisory 2020-1493-01 By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:34:41 GMT Red Hat Security Advisory 2020-1493-01 - The kernel-alt packages provide the Linux kernel version 4.x. Issues addressed include buffer overflow, denial of service, heap overflow, and null pointer vulnerabilities. Full Article
it Red Hat Security Advisory 2020-1505-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:53:17 GMT Red Hat Security Advisory 2020-1505-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. An out-of-bounds heap access vulnerability was addressed. Full Article
it Red Hat Security Advisory 2020-1524-01 By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:10:47 GMT Red Hat Security Advisory 2020-1524-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
it Red Hat Security Advisory 2020-1769-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:19:01 GMT Red Hat Security Advisory 2020-1769-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, information leakage, integer overflow, null pointer, out of bounds read, and use-after-free vulnerabilities. Full Article
it Red Hat Security Advisory 2020-1966-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:56:45 GMT Red Hat Security Advisory 2020-1966-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
it Qualys Security Advisory - OpenBSD Authentication Bypass / Privilege Escalation By packetstormsecurity.com Published On :: Thu, 05 Dec 2019 21:08:17 GMT Qualys has discovered that OpenBSD suffers from multiple authentication bypass and local privilege escalation vulnerabilities. Full Article
it Qualys Security Advisory - OpenBSD Dynamic Loader Privilege Escalation By packetstormsecurity.com Published On :: Thu, 12 Dec 2019 13:39:44 GMT Qualys discovered a local privilege escalation in OpenBSD's dynamic loader (ld.so). This vulnerability is exploitable in the default installation (via the set-user-ID executable chpass or passwd) and yields full root privileges. They developed a simple proof of concept and successfully tested it against OpenBSD 6.6 (the current release), 6.5, 6.2, and 6.1, on both amd64 and i386; other releases and architectures are probably also exploitable. Full Article
it An Unknown Hacker Stole Sensitive Data On Australia's War Planes By packetstormsecurity.com Published On :: Fri, 13 Oct 2017 14:07:38 GMT Full Article headline hacker government australia data loss cyberwar
it Australia Likely To Get Its Own GDPR By packetstormsecurity.com Published On :: Fri, 03 Nov 2017 14:20:15 GMT Full Article headline government privacy australia data loss