it Ubuntu Security Notice USN-3616-1 By packetstormsecurity.com Published On :: Tue, 03 Apr 2018 18:19:00 GMT Ubuntu Security Notice 3616-1 - It was discovered that Python Crypto incorrectly generated ElGamal key parameters. A remote attacker could possibly use this issue to obtain sensitive information. Full Article
it Ubuntu Security Notice USN-3616-2 By packetstormsecurity.com Published On :: Mon, 09 Apr 2018 16:41:45 GMT Ubuntu Security Notice 3616-2 - USN-3616-1 fixed a vulnerability in Python Crypto. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that Python Crypto incorrectly generated ElGamal key parameters. A remote attacker could possibly use this issue to obtain sensitive information. Various other issues were also addressed. Full Article
it Ubuntu Security Notice USN-3727-1 By packetstormsecurity.com Published On :: Wed, 01 Aug 2018 18:32:00 GMT Ubuntu Security Notice 3727-1 - It was discovered that Bouncy Castle incorrectly handled certain crypto algorithms. A remote attacker could possibly use these issues to obtain sensitive information, including private keys. Full Article
it RSA BSAFE Micro Edition Suite / Crypto-C Micro Edition Overflow / DoS By packetstormsecurity.com Published On :: Wed, 29 Aug 2018 00:30:11 GMT RSA BSAFE Micro Edition Suite and Crypto-C Micro Edition suffer from resource exhaustion, integer overflow, improper clearing of heap memory, covert timing channel, and buffer over-read vulnerabilities. Full Article
it Debian Security Advisory 4296-1 By packetstormsecurity.com Published On :: Tue, 18 Sep 2018 02:18:40 GMT Debian Linux Security Advisory 4296-1 - Two vulnerabilities were discovered in mbedtls, a lightweight crypto and SSL/TLS library which could result in plain text recovery via side-channel attacks. Full Article
it Ubuntu Security Notice USN-3901-1 By packetstormsecurity.com Published On :: Wed, 06 Mar 2019 18:08:40 GMT Ubuntu Security Notice 3901-1 - Jann Horn discovered that the userfaultd implementation in the Linux kernel did not properly restrict access to certain ioctls. A local attacker could use this possibly to modify files. It was discovered that the crypto subsystem of the Linux kernel leaked uninitialized memory to user space in some situations. A local attacker could use this to expose sensitive information. Various other issues were also addressed. Full Article
it Positive Hack Days 10 Call For Papers By packetstormsecurity.com Published On :: Tue, 28 Jan 2020 20:32:22 GMT Call For Papers for Positive Hack Days 10 which will take place in Moscow, Russia May 13th through the 14th, 2020. Full Article
it Facebook's Sir Nick Clegg Criticized Over WhatsApp Security By packetstormsecurity.com Published On :: Fri, 24 Jan 2020 16:52:25 GMT Full Article headline hacker privacy flaw facebook cryptography
it Linux x86_x64 sys_creat("ajit", 0755) Shellcode By packetstormsecurity.com Published On :: Sun, 29 Dec 2019 10:11:11 GMT 53 bytes small Linux/x86_x64 sys_creat("ajit", 0755) shellcode. Full Article
it Indian Spooks Snooping Without ISP Knowledge By packetstormsecurity.com Published On :: Mon, 09 Sep 2013 15:11:50 GMT Full Article headline government privacy india spyware
it All Phones In India To Be Equipped With Panic Buttons From 2017 By packetstormsecurity.com Published On :: Wed, 27 Apr 2016 14:37:59 GMT Full Article headline phone india
it CloudFlare Probes Mystery Interception Of Site Traffic Across India By packetstormsecurity.com Published On :: Thu, 14 Jul 2016 14:30:56 GMT Full Article headline privacy india
it 3.2 Million Debit Cards Stolen In India By packetstormsecurity.com Published On :: Thu, 20 Oct 2016 14:04:13 GMT Full Article headline hacker india cybercrime data loss fraud
it Google Denies Harvesting Student Data With Free Chromebooks By packetstormsecurity.com Published On :: Fri, 21 Feb 2020 15:26:50 GMT Full Article headline privacy data loss google
it Google Launches Coronavirus Website In The United States By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 16:11:13 GMT Full Article headline virus google
it Citrix Application Delivery Controller / Gateway Remote Code Execution / Traversal By packetstormsecurity.com Published On :: Sat, 11 Jan 2020 18:22:22 GMT Citrix Application Delivery Controller and Citrix Gateway directory traversal remote code execution exploit. Full Article
it Citrix ADC / Gateway Path Traversal By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:34:36 GMT This is an nmap nse script to test for the path traversal vulnerability in Citrix Application Delivery Controller (ADC) and Gateway. Full Article
it SuiteCRM 7.11.11 Broken Access Control / Local File Inclusion By packetstormsecurity.com Published On :: Thu, 13 Feb 2020 15:49:06 GMT SuiteCRM versions 7.11.11 and below suffer from an add_to_prospect_list broken access control that allows for local file inclusion attacks. Full Article
it QRadar Community Edition 7.3.1.6 Arbitrary Object Instantiation By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:15:08 GMT QRadar Community Edition version 7.3.1.6 is vulnerable to instantiation of arbitrary objects based on user-supplied input. An authenticated attacker can abuse this to perform various types of attacks including server-side request forgery and (potentially) arbitrary execution of code. Full Article
it Little Town in Romania Is Cybercrime Central By packetstormsecurity.com Published On :: Tue, 15 Feb 2011 15:30:24 GMT Full Article headline cybercrime romania
it Romanian Authorities Cuff NASA Hack Suspect By packetstormsecurity.com Published On :: Thu, 17 Nov 2011 15:41:44 GMT Full Article headline hacker romania
it Romanians Plead Guilty To Credit Card Hack On US Subway Shops By packetstormsecurity.com Published On :: Tue, 18 Sep 2012 15:02:35 GMT Full Article headline bank cybercrime fraud romania
it DNS Servers Filled With Wrong Kool-Aid In Romania By packetstormsecurity.com Published On :: Thu, 29 Nov 2012 07:22:09 GMT Full Article headline dns romania
it Europol Smashes Romanian Credit Card Fraud Gang By packetstormsecurity.com Published On :: Fri, 29 Mar 2013 02:08:15 GMT Full Article headline cybercrime fraud romania
it Penitent Romanian Hacker Aims To Protect World's ATMs By packetstormsecurity.com Published On :: Sun, 19 May 2013 05:46:28 GMT Full Article headline hacker bank romania
it Celebrity Email Cracker Guccifer Gets Cuffed By packetstormsecurity.com Published On :: Thu, 23 Jan 2014 03:08:49 GMT Full Article headline hacker privacy email data loss romania
it FBI Arrests Five Over 'Hackers For Hire' Websites By packetstormsecurity.com Published On :: Mon, 27 Jan 2014 17:54:48 GMT Full Article headline hacker government india china cybercrime fraud romania fbi
it Romanian Man Extradited To U.S. To Face Hacking Charges By packetstormsecurity.com Published On :: Wed, 25 Mar 2015 13:47:48 GMT Full Article headline hacker government usa romania
it Romanian CCTV Ransomware Culprit Admits Guilt By packetstormsecurity.com Published On :: Fri, 21 Sep 2018 15:12:38 GMT Full Article headline government malware usa fraud romania
it Ac4p.com Gallery 1.0 Cross Site Scripting / Shell Upload / Bypass / Disclosure By packetstormsecurity.com Published On :: Tue, 23 Feb 2010 07:00:24 GMT Ac4p.com Gallery version 1.0 suffers from cross site scripting, phpinfo disclosure, shell upload, and insecure cookie handling vulnerabilities. Full Article
it Memorial Web Site Script Password Reset / Insecure Cookie By packetstormsecurity.com Published On :: Sat, 24 Apr 2010 02:58:12 GMT Memorial Web Site Script suffers from password reset and insecure cookie handling vulnerabilities. Full Article
it Paddelberg Topsite Script Insecure Cookie By packetstormsecurity.com Published On :: Mon, 09 Jan 2012 20:53:57 GMT Paddelberg Topsite Script version 1.2.3 suffers from an authentication bypass vulnerability due to insecure cookie handling. Full Article
it Red Hat Security Advisory 2020-1975-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:37 GMT Red Hat Security Advisory 2020-1975-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
it Red Hat Security Advisory 2020-1979-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:52 GMT Red Hat Security Advisory 2020-1979-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
it Red Hat Security Advisory 2020-1978-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:05 GMT Red Hat Security Advisory 2020-1978-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
it Red Hat Security Advisory 2020-1980-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:13 GMT Red Hat Security Advisory 2020-1980-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
it Red Hat Security Advisory 2020-1422-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:30 GMT Red Hat Security Advisory 2020-1422-01 - This release of Red Hat build of Eclipse Vert.x 3.9.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Full Article
it Latest Java Zero-Day Linked To Bit9 Compromise By packetstormsecurity.com Published On :: Sat, 02 Mar 2013 23:25:27 GMT Full Article headline hacker flaw symantec java
it Symantec Warns On Credit Card Security Phishing Scam By packetstormsecurity.com Published On :: Wed, 17 Apr 2013 14:55:05 GMT Full Article headline bank cybercrime scam symantec phish
it Malware Boom Forces Security Vendors To Roll Out Upgrades Every 40 Minutes By packetstormsecurity.com Published On :: Tue, 08 Apr 2014 15:31:05 GMT Full Article headline malware virus cybercrime fraud symantec
it Symantec Fires Employees Over Issuing Rogue Google Security Certificates By packetstormsecurity.com Published On :: Mon, 21 Sep 2015 15:22:31 GMT Full Article headline cybercrime fraud google symantec cryptography
it Google Makes Symantec An Offer It Can't Refuse By packetstormsecurity.com Published On :: Thu, 29 Oct 2015 15:42:12 GMT Full Article headline fraud google symantec cryptography
it Symantec Flaws As Bad As It Gets, Claims Google's Project Zero By packetstormsecurity.com Published On :: Thu, 30 Jun 2016 02:19:04 GMT Full Article headline flaw google symantec backdoor
it Flaws Found In Security Products AVG, Symantec, And McAfee By packetstormsecurity.com Published On :: Wed, 20 Jul 2016 16:36:21 GMT Full Article headline malware virus flaw symantec mcafee
it Symantec Says It Can End Google Cert Spat By packetstormsecurity.com Published On :: Thu, 27 Apr 2017 15:48:12 GMT Full Article headline privacy google symantec cryptography
it Symantec Tricked Into Removing Legit Certificates By Security Researcher By packetstormsecurity.com Published On :: Fri, 21 Jul 2017 16:54:21 GMT Full Article headline hacker symantec cryptography
it Hackers' Own Tools Are Full Of Vulnerabilities By packetstormsecurity.com Published On :: Wed, 26 Jul 2017 15:58:34 GMT Full Article headline hacker malware flaw symantec
it 23,000 HTTPS Certs Will Be Axed In Next 24 Hours Amid Bitter Turf War By packetstormsecurity.com Published On :: Thu, 01 Mar 2018 01:02:09 GMT Full Article headline privacy symantec cryptography
it Cisco Patches Critical Vulnerabilities In Policy Suite By packetstormsecurity.com Published On :: Thu, 19 Jul 2018 14:27:38 GMT Full Article headline flaw patch cisco
it Cisco Warns Customers Of Critical Flaws, Including Struts By packetstormsecurity.com Published On :: Thu, 06 Sep 2018 13:13:53 GMT Full Article headline flaw patch cisco