or Debian Security Advisory 4577-1 By packetstormsecurity.com Published On :: Thu, 28 Nov 2019 18:32:22 GMT Debian Linux Security Advisory 4577-1 - Tim Dusterhus discovered that haproxy, a TCP/HTTP reverse proxy, did not properly sanitize HTTP headers when converting from HTTP/2 to HTTP/1. This would allow a remote user to perform CRLF injections. Full Article
or Red Hat Security Advisory 2020-1000-01 By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 18:22:22 GMT Red Hat Security Advisory 2020-1000-01 - The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format. A heap-based overflow was addressed. Full Article
or Red Hat Security Advisory 2020-1289-01 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:47:19 GMT Red Hat Security Advisory 2020-1289-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include an out of bounds write vulnerability. Full Article
or Red Hat Security Advisory 2020-1290-01 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 15:00:03 GMT Red Hat Security Advisory 2020-1290-01 - HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high availability environments. Issues addressed include an out of bounds write vulnerability. Full Article
or Red Hat Security Advisory 2020-1288-01 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 15:00:14 GMT Red Hat Security Advisory 2020-1288-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include an out of bounds write vulnerability. Full Article
or Red Hat Security Advisory 2020-1702-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:27:31 GMT Red Hat Security Advisory 2020-1702-01 - The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format. Issues addressed include a heap overflow vulnerability. Full Article
or NSA Hacking Tools Used Against Nuke, Aerospace Worlds By packetstormsecurity.com Published On :: Mon, 22 Oct 2018 14:35:34 GMT Full Article headline hacker government usa space data loss cyberwar nsa scada
or Yes, You Can Remotely Hack Factory, Building Site Cranes. Wait, What? By packetstormsecurity.com Published On :: Wed, 16 Jan 2019 13:35:32 GMT Full Article headline hacker flaw scada
or Half Of Industrial Control System Networks Have Faced Cyber Attacks, Say Security Researchers By packetstormsecurity.com Published On :: Wed, 27 Mar 2019 14:49:32 GMT Full Article headline hacker cyberwar scada
or U.S. Defense, Intelligence Ramps Up Efforts To Insert Malware In Russia's Grid By packetstormsecurity.com Published On :: Mon, 17 Jun 2019 14:40:45 GMT Full Article headline government usa russia cyberwar scada
or LookBack Malware Targeting Utility Sector By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 14:42:08 GMT Full Article headline malware scada
or North Korean Malware Found On Indian Nuclear Plant's Network By packetstormsecurity.com Published On :: Wed, 30 Oct 2019 15:36:43 GMT Full Article headline hacker government india cyberwar korea scada
or Storm Ringing PABX Test Tool By packetstormsecurity.com Published On :: Fri, 24 Aug 2012 01:37:03 GMT This simple tool is useful to test a PABX with "allow guest" parameter set to "yes" (in this scenario an anonymous caller could place a call). The aim of the tool is to ring all the sip Terminal Equipment (phones). Full Article
or Cisco Security Advisory 20130206-ata187 By packetstormsecurity.com Published On :: Wed, 06 Feb 2013 21:24:41 GMT Cisco Security Advisory - Cisco ATA 187 Analog Telephone Adaptor firmware versions 9.2.1.0 and 9.2.3.1 contain a vulnerability that could allow an unauthenticated, remote attacker to access the operating system of the affected device. Cisco has available free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. Full Article
or Secunia Security Advisory 52060 By packetstormsecurity.com Published On :: Thu, 07 Feb 2013 07:41:49 GMT Secunia Security Advisory - A vulnerability has been reported in Cisco ATA 187 Analog Telephone Adaptor, which can be exploited by malicious people to compromise a vulnerable device. Full Article
or Aastra IP Telephone Hardcoded Password By packetstormsecurity.com Published On :: Mon, 08 Apr 2013 20:22:22 GMT The Aastra 6753i IP Telephone suffers from a hardcoded telnetd administrative password. Full Article
or Design And Implementation Of A Voice Encryption System For Telephone Networks By packetstormsecurity.com Published On :: Mon, 01 Sep 2014 14:02:22 GMT This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish. Full Article
or Secunia Security Advisory 37786 By packetstormsecurity.com Published On :: Wed, 16 Dec 2009 15:35:57 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper Networks Secure Access, which can be exploited by malicious people to bypass certain security restrictions. Full Article
or Secunia Security Advisory 38628 By packetstormsecurity.com Published On :: Mon, 15 Feb 2010 14:26:42 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper Networks Installer Service, which can be exploited by malicious people to compromise a vulnerable system. Full Article
or Secunia Security Advisory 38841 By packetstormsecurity.com Published On :: Wed, 10 Mar 2010 07:03:31 GMT Secunia Security Advisory - Niels Heinen has reported a vulnerability in Juniper Networks Secure Access, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
or Secunia Security Advisory 40117 By packetstormsecurity.com Published On :: Fri, 11 Jun 2010 13:54:17 GMT Secunia Security Advisory - Richard Brain has reported a weakness in Juniper IVE OS, which can be exploited by malicious people to conduct redirection attacks. Full Article
or ProCheckUp Security Advisory 2009.16 By packetstormsecurity.com Published On :: Thu, 15 Jul 2010 00:49:36 GMT Procheckup has found by making a malformed request to the Juniper IVE Web interface without authentication, that a vanilla cross site scripting (XSS) attack is possible. Full Article
or Secunia Security Advisory 40561 By packetstormsecurity.com Published On :: Thu, 15 Jul 2010 07:01:23 GMT Secunia Security Advisory - Richard Brain has reported a vulnerability in Juniper IVE, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
or Zero Day Initiative Advisory 10-231 By packetstormsecurity.com Published On :: Mon, 08 Nov 2010 23:34:08 GMT Zero Day Initiative Advisory 10-231 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Juniper SA Series devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the meeting_testjava.cgi page which is used to test JVM compatibility. When handling the DSID HTTP header the code allows an attacker to inject arbitrary javascript into the page. This can be abused by an attacker to perform a cross-site scripting attack on the device. Full Article
or Secunia Security Advisory 42145 By packetstormsecurity.com Published On :: Tue, 09 Nov 2010 07:59:31 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper IVE OS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
or Secunia Security Advisory 43983 By packetstormsecurity.com Published On :: Sat, 02 Apr 2011 02:57:01 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper Networks Secure Access, which can be exploited by malicious people to bypass certain security restrictions. Full Article
or Secunia Security Advisory 46797 By packetstormsecurity.com Published On :: Fri, 11 Nov 2011 04:09:04 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper Junos, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Article
or Secunia Security Advisory 46903 By packetstormsecurity.com Published On :: Thu, 17 Nov 2011 02:29:33 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper Junos, which can be exploited by malicious people to bypass certain security restrictions. Full Article
or Secunia Security Advisory 48718 By packetstormsecurity.com Published On :: Thu, 05 Apr 2012 05:30:19 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper IVE OS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
or Secunia Security Advisory 48720 By packetstormsecurity.com Published On :: Thu, 05 Apr 2012 05:30:28 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper IVE OS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
or Secunia Security Advisory 49587 By packetstormsecurity.com Published On :: Tue, 19 Jun 2012 06:52:22 GMT Secunia Security Advisory - Dell SecureWorks has reported a vulnerability in Juniper Networks Mobility System, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
or Secunia Security Advisory 51832 By packetstormsecurity.com Published On :: Tue, 15 Jan 2013 03:13:49 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper JunosE, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Article
or Top Infectious Disease Expert Does Not Rule Out Supporting Temporary National Lockdown To Combat COVID-19 By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 14:23:05 GMT Full Article headline government usa virus
or Hackers Hit US Health Agency During Coronavirus Crisis By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:45:12 GMT Full Article headline hacker government usa virus
or Google / Verily Clarify Their Roles In The US Coronavirus Response By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:45:53 GMT Full Article headline government usa virus google
or California Issues Statewide Stay At Home Order To Combat COVID-19 By packetstormsecurity.com Published On :: Fri, 20 Mar 2020 15:12:08 GMT Full Article headline government usa virus
or New York May Be Weeks Away From Peak Of Coronavirus By packetstormsecurity.com Published On :: Sat, 28 Mar 2020 15:12:54 GMT Full Article headline government usa virus
or Dr. Anthony Fauci Forced To Beef Up Security As Death Threats Increase By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 13:49:47 GMT Full Article headline government usa virus
or Trump Administration's Lack Of A Unified Coronavirus Strategy Will Cost Lives, A Dozen Experts Say By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:05 GMT Full Article headline government usa virus
or Georgia Reopens Businesses As Death Toll Rises By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:32:10 GMT Full Article headline government usa virus
or Trump Admin Threatens To Sue States That Don't Lift Orders By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:28:39 GMT Full Article headline government usa virus
or Running Encrypted ELF Binaries In Memory By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:45:14 GMT Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project. Full Article
or REVULN 20x3 Call For Papers By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:14:30 GMT REVULN 20x3 is an international conference taking place on September 9th through the 10th, 2020 in Bangkok (Thailand) at Ibis Styles Bangkok Sukhumvit Phra Khanong. Full Article
or Solving Computer Forensic Case Using Autopsy By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:08:11 GMT Whitepaper called Solving Computer Forensic Case Using Autopsy. Full Article
or Hackers 2 Hackers Conference 17th Edition Call For Papers By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 19:22:22 GMT The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020. Full Article
or Active Directory DCSync By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 10:11:11 GMT This is a whitepaper that discusses using DCSync to pull password hashes from a domain controller. Full Article
or Exploiting CAN-Bus Using Instrument Cluster Simulator By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:21:38 GMT Whitepaper called Exploiting CAN-Bus using Instrument Cluster Simulator. Full Article
or Packet Storm Advisory 2013-0621 - Facebook Information Disclosure By packetstormsecurity.com Published On :: Fri, 21 Jun 2013 20:56:14 GMT Facebook suffered from an information disclosure vulnerability. If a user uploaded their contacts to Facebook and then proceeded to download their expanded dataset from the DYI (Download Your Information) section, they would receive a file called addressbook.html in their downloaded archive. The addressbook.html is supposed to house the contact information they uploaded. However, due to a flaw in how Facebook implemented this, it also housed contact information from other uploads other users have performed for the same person, provided they had one piece of matching data. This effectively built large dossiers on users and disclosed their information to anyone that knew at least one piece of matching data. Full Article
or Packet Storm Exploit 2013-0811-1 - Oracle Java storeImageArray() Invalid Array Indexing Code Execution By packetstormsecurity.com Published On :: Mon, 12 Aug 2013 04:11:58 GMT Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
or Packet Storm Advisory 2013-0811-1 - Oracle Java storeImageArray() By packetstormsecurity.com Published On :: Mon, 12 Aug 2013 04:34:58 GMT Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was obtained through the Packet Storm Bug Bounty program. Full Article