it Oracle Patches Another Actively Exploited WebLogic 0-Day By packetstormsecurity.com Published On :: Wed, 19 Jun 2019 17:09:10 GMT Full Article headline hacker flaw oracle
it Oracle Patches 218 Security Vulnerabilities By packetstormsecurity.com Published On :: Thu, 17 Oct 2019 14:06:58 GMT Full Article headline database flaw patch oracle
it Oracle Just Released A Whopping 334 Security Fixes In Critical Patch Update By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:22:26 GMT Full Article headline database flaw patch oracle
it Red Hat Security Advisory 2020-1577-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:22:21 GMT Red Hat Security Advisory 2020-1577-01 - The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments. Issues addressed include buffer overflow, denial of service, integer overflow, null pointer, and out of bounds read vulnerabilities. Full Article
it Red Hat Security Advisory 2020-1686-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:24:37 GMT Red Hat Security Advisory 2020-1686-01 - The libmspack packages contain a library providing compression and extraction of the Cabinet file format used by Microsoft. Issues addressed include a buffer overflow vulnerability. Full Article
it Red Hat Security Advisory 2020-1567-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:29:58 GMT Red Hat Security Advisory 2020-1567-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include denial of service, information leakage, integer overflow, null pointer, out of bounds read, and use-after-free vulnerabilities. Full Article
it Red Hat Security Advisory 2020-1766-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:30:39 GMT Red Hat Security Advisory 2020-1766-01 - GNOME is the default desktop environment of Red Hat Enterprise Linux. Issues addressed include buffer overflow and bypass vulnerabilities. Full Article
it Red Hat Security Advisory 2020-1708-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:34:54 GMT Red Hat Security Advisory 2020-1708-01 - Liblouis is an open source braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, supports contracted and uncontracted translation for many languages and has support for hyphenation. New languages can easily be added through tables that support a rule or dictionary based approach. Liblouis also supports math braille. Issues addressed include a buffer overflow vulnerability. Full Article
it Red Hat Security Advisory 2020-1636-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:35:04 GMT Red Hat Security Advisory 2020-1636-01 - libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV. Issues addressed include a buffer overflow vulnerability. Full Article
it Red Hat Security Advisory 2020-1688-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:40:52 GMT Red Hat Security Advisory 2020-1688-01 - The libtiff packages contain a library of functions for manipulating Tagged Image File Format files. Issues addressed include an integer overflow vulnerability. Full Article
it Technical Cyber Security Alert 2007-163A By packetstormsecurity.com Published On :: Wed, 13 Jun 2007 01:25:48 GMT Technical Cyber Security Alert TA07-163A - Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Windows Secure Channel, Internet Explorer, Win32 API, Windows Mail and Outlook Express. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system. Full Article
it SetNamedSecurityInfo() Ignores / Destroys Protected DACLs / SACLs By packetstormsecurity.com Published On :: Tue, 19 Jun 2012 18:23:33 GMT With Windows 2000 Microsoft introduced the inheritance of access rights and new Win32-API functions like SetNamedSecurityInfo() which handle the inheritance. SetNamedSecurityInfo() but has a serious bug: it applies inheritable ACEs from a PARENT object to a target object even if it must not do so, indicated by the flags SE_DACL_PROTECTED and/or SE_SACL_PROTECTED in the security descriptor of the target object. Full Article
it Whale Win32 Attack Surface Toolkit By packetstormsecurity.com Published On :: Wed, 07 Dec 2016 00:44:44 GMT Whale in a win32 attack surface toolkit written in C#. It's capable of monitoring many of different areas of the Windows for new and removed kernel objects, open ports, drivers, services and much more. It also allows a user to test for different bug classes and has found a few interesting issues across the sub-systems. Full Article
it CentOS-WebPanel.com Control Web Panel 0.9.8.846 Cross Site Scripting By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:55:44 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.846 suffers from a reflective cross site scripting vulnerability. Full Article
it CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.851 Arbitrary Database Drop By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:05:24 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.851 suffers from an arbitrary database dropping vulnerability. Full Article
it CentOS 7.6.1810 Control Web Panel 0.9.8.837 Cross Site Scripting By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 15:59:03 GMT CentOS version 7.6.1810 with Control Web Panel version 0.9.8.837 suffers from a persistent cross site scripting vulnerability. Full Article
it CentOS 7.6.1810 Control Web Panel 0.9.8.837 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 16:01:11 GMT CentOS version 7.6.1810 with Control Web Panel version 0.9.8.837 suffers from a cross site request forgery vulnerability. Full Article
it British E-Passports Arrive, With Questions By packetstormsecurity.com Published On :: Wed, 07 Feb 2007 01:05:05 GMT Full Article britain passport
it Crypto Boffins Urge Belgium To Withdraw Early ePassports By packetstormsecurity.com Published On :: Sun, 10 Jun 2007 09:42:05 GMT Full Article flaw passport
it Germany Rolls Out ePassport II - It's Fingerprinting Good! By packetstormsecurity.com Published On :: Thu, 01 Nov 2007 11:23:35 GMT Full Article germany passport
it UK Electronic Passports Cloned Within Minutes By packetstormsecurity.com Published On :: Thu, 07 Aug 2008 22:39:58 GMT Full Article britain passport
it THC/vonJeek Provide You The Ability To Clone ePassports By packetstormsecurity.com Published On :: Mon, 29 Sep 2008 17:01:48 GMT Full Article passport
it State Department Passport Snoop Faces Little Or No Jail Time By packetstormsecurity.com Published On :: Wed, 14 Jan 2009 20:24:13 GMT Full Article passport
it Interpol Issues Arrest Warrant For Fake Passport Hit Team By packetstormsecurity.com Published On :: Fri, 19 Feb 2010 16:20:00 GMT Full Article passport
it Hackers Expose Security Flaws With Elvis Presley Passport By packetstormsecurity.com Published On :: Tue, 23 Feb 2010 07:24:09 GMT Full Article hacker flaw passport
it Red Hat Security Advisory 2020-0464-01 By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 21:03:06 GMT Red Hat Security Advisory 2020-0464-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. Issues addressed include a bypass vulnerability. Full Article
it Red Hat Security Advisory 2020-0734-01 By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 20:56:21 GMT Red Hat Security Advisory 2020-0734-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include a bypass vulnerability. Full Article
it Red Hat Security Advisory 2020-0652-01 By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 20:56:29 GMT Red Hat Security Advisory 2020-0652-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a bypass vulnerability. Full Article
it Citrix Gateway 11.1 / 12.0 / 12.1 Cache Bypass By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 17:09:14 GMT Citrix Gateway versions 11.1, 12.0, and 12.1 suffer from a caching bypass vulnerability. Full Article
it Ivanti Workspace Manager Security Bypass By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:54:31 GMT Ivanti Workspace Manager versions prior to 10.3.90 suffer from a bypass vulnerability. Full Article
it SITS:Vision 9.7.0 Authentication Bypass By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:33:29 GMT An authentication bypass vulnerability is present in the stand-alone SITS:Vision component of Tribal SITS in its default configuration, related to unencrypted communications sent by the client each time it is launched. This vulnerability allows unauthenticated attackers to gain access to credentials or execute arbitrary SQL queries on the SITS backend as long as they have access to the client executable or can intercept traffic from a user who does. Version 9.7.0 is affected. Full Article
it Red Hat Security Advisory 2020-1021-01 By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 20:22:22 GMT Red Hat Security Advisory 2020-1021-01 - GNOME is the default desktop environment of Red Hat Enterprise Linux. Issues addressed include a bypass vulnerability. Full Article
it Red Hat Security Advisory 2020-1268-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:21:44 GMT Red Hat Security Advisory 2020-1268-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability. Full Article
it Red Hat Security Advisory 2020-1346-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:41:40 GMT Red Hat Security Advisory 2020-1346-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability. Full Article
it Django 3.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:43:36 GMT Django version 3.0 suffers from a cross site request forgery token bypass vulnerability. Full Article
it Red Hat Security Advisory 2020-1462-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 23:04:44 GMT Red Hat Security Advisory 2020-1462-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability. Full Article
it Red Hat Security Advisory 2020-1475-01 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 00:13:27 GMT Red Hat Security Advisory 2020-1475-01 - Red Hat CodeReady Workspaces 2.1.0 provides a cloud developer-workspace server and a browser-based IDE built for teams and organizations. CodeReady Workspaces runs in OpenShift and is well-suited for container-based development. Issues addressed include a bypass vulnerability. Full Article
it QRadar Community Edition 7.3.1.6 Authorization Bypass By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:28:15 GMT QRadar Community Edition version 7.3.1.6 suffers from an authorization bypass vulnerability. Full Article
it ManageEngine DataSecurity Plus Authentication Bypass By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:50:07 GMT ManageEngine DataSecurity Plus versions prior to 6.0.1 and ADAudit Plus versions prior to 6.0.3 suffer from an authentication bypass vulnerability. Full Article
it Nissan Car Secretly Shares Driver Data With Websites By packetstormsecurity.com Published On :: Tue, 14 Jun 2011 00:52:18 GMT Full Article headline data loss car
it Ubuntu Security Notice USN-4171-5 By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:20:58 GMT Ubuntu Security Notice 4171-5 - USN-4171-1 fixed vulnerabilities in Apport. This caused a regression in autopkgtest and python2 compatibility. This update fixes the problem. Kevin Backhouse discovered Apport would read its user-controlled settings file as the root user. This could be used by a local attacker to possibly crash Apport or have other unspecified consequences. Sander Bos discovered a race-condition in Apport during core dump creation. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user. Sander Bos discovered Apport mishandled crash dumps originating from containers. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user. Sander Bos discovered Apport mishandled lock-file creation. This could be used by a local attacker to cause a denial of service against Apport. Kevin Backhouse discovered Apport read various process-specific files with elevated privileges during crash dump generation. This could could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user. Various other issues were also addressed. Full Article
it Mandos Encrypted File System Unattended Reboot Utility 1.8.10 By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:10:50 GMT The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system. Full Article
it Ubuntu Security Notice USN-4312-1 By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:49:27 GMT Ubuntu Security Notice 4312-1 - Matthias Gerstner discovered that Timeshift did not securely create temporary files. An attacker could exploit a race condition in Timeshift and potentially execute arbitrary commands as root. Full Article
it Red Hat Security Advisory 2020-1308-01 By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 02:50:51 GMT Red Hat Security Advisory 2020-1308-01 - The org.ovirt.engine-root is a core component of oVirt. Full Article
it Unraid 6.8.0 Authentication Bypass / Arbitrary Code Execution By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:37:57 GMT This Metasploit module exploits two vulnerabilities affecting Unraid 6.8.0. An authentication bypass is used to gain access to the administrative interface, and an insecure use of the extract PHP function can be abused for arbitrary code execution as root. Full Article
it Red Hat Security Advisory 2020-1804-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:33:55 GMT Red Hat Security Advisory 2020-1804-01 - The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Full Article
it HP Performance Monitoring xglance Privilege Escalation By packetstormsecurity.com Published On :: Mon, 04 May 2020 16:37:14 GMT This Metasploit module is an exploit that takes advantage of xglance-bin, part of HP's Glance (or Performance Monitoring) version 11 and subsequent, which was compiled with an insecure RPATH option. The RPATH includes a relative path to -L/lib64/ which can be controlled by a user. Creating libraries in this location will result in an escalation of privileges to root. Full Article
it Guardian Told It Was Target Of Saudi Hacking Unit After Khashoggi Killing By packetstormsecurity.com Published On :: Wed, 26 Jun 2019 14:20:38 GMT Full Article headline hacker government privacy phone britain cyberwar spyware saudi arabia
it Multiple Vulnerabilities in MySQL - Upgrade Now By packetstormsecurity.com Published On :: Tue, 17 Dec 2002 03:08:36 GMT Full Article database mysql
it OpenSSL Toolkit 1.1.1f By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:43:06 GMT OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. Full Article