y MPC Sharj 3.11.1 Arbitrary File Download By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:39:30 GMT MPC Sharj version 3.11.1 suffers from an arbitrary file download vulnerability. Full Article
y webTareas 2.0.p8 Arbitrary File Deletion By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:49:45 GMT webTareas version 2.0.p8 suffers from an arbitrary file deletion vulnerability. Full Article
y Crypto Boffins: RSA Tokens Can Be Cracked In 13 Minutes By packetstormsecurity.com Published On :: Wed, 27 Jun 2012 14:21:22 GMT Full Article headline flaw science cryptography rsa
y Quantum Processor's Prime Feat Raises Security Issues By packetstormsecurity.com Published On :: Wed, 29 Aug 2012 04:41:13 GMT Full Article headline flaw science rsa
y RSA Warns Over NSA Link To Encryption Algorithm By packetstormsecurity.com Published On :: Fri, 20 Sep 2013 15:16:59 GMT Full Article headline government privacy flaw nsa cryptography rsa
y NSA Paid $10m To Put A Backdoor In RSA Crypto By packetstormsecurity.com Published On :: Sun, 22 Dec 2013 18:18:00 GMT Full Article headline government usa flaw backdoor nsa cryptography rsa
y Half Dozen Security Experts Boycott RSA Over NSA Deal By packetstormsecurity.com Published On :: Wed, 08 Jan 2014 16:05:36 GMT Full Article headline privacy nsa conference cryptography rsa
y RSA 2014 Security Conference App Has Severe Vulnerabilities By packetstormsecurity.com Published On :: Fri, 28 Feb 2014 16:05:23 GMT Full Article headline privacy data loss flaw conference rsa
y NSA Infiltrated RSA Security More Deeply Than Thought By packetstormsecurity.com Published On :: Mon, 31 Mar 2014 14:37:20 GMT Full Article headline government usa backdoor nsa cryptography rsa
y RSA Conference 2019: The Sky's The Limit For Satellite Hacks By packetstormsecurity.com Published On :: Thu, 07 Mar 2019 15:10:13 GMT Full Article headline hacker space conference rsa
y One In Every 172 Active RSA Certificates Are Vulnerable To Attack By packetstormsecurity.com Published On :: Mon, 16 Dec 2019 15:17:53 GMT Full Article headline privacy flaw cryptography rsa
y John McAfee Now Claims He Has A Spy Ring In The Belize Government By packetstormsecurity.com Published On :: Tue, 08 Jan 2013 04:31:22 GMT Full Article headline government spyware mcafee
y Hollywood Takes The Bait, Options McAfee Movie By packetstormsecurity.com Published On :: Tue, 15 Jan 2013 05:10:35 GMT Full Article headline mcafee
y Malware Getting Smarter, Says McAfee By packetstormsecurity.com Published On :: Fri, 22 Feb 2013 04:16:14 GMT Full Article headline malware mcafee
y McAfee Discovers Adobe Reader Security Flaw By packetstormsecurity.com Published On :: Tue, 30 Apr 2013 00:02:38 GMT Full Article headline flaw adobe mcafee
y McAfee Buys Stonesoft Security For $389m By packetstormsecurity.com Published On :: Tue, 07 May 2013 14:31:04 GMT Full Article headline mcafee
y John McAfee Will Help You Block The NSA For $100 By packetstormsecurity.com Published On :: Wed, 02 Oct 2013 15:08:33 GMT Full Article headline government privacy spyware mcafee nsa
y McAfee Uncovers 200 New Cyber Attacks Per Minute In 2013 By packetstormsecurity.com Published On :: Mon, 10 Mar 2014 15:12:39 GMT Full Article headline hacker malware cybercrime mcafee
y John McAfee Flogging Crypto IM App Chadder By packetstormsecurity.com Published On :: Tue, 06 May 2014 00:24:20 GMT Full Article headline privacy mcafee nsa
y McAfee Claims Ashley Madison Hack Could Destabilize Society By packetstormsecurity.com Published On :: Fri, 24 Jul 2015 14:24:46 GMT Full Article headline hacker privacy data loss mcafee
y John McAfee Says His Twitter Account Was Hacked By packetstormsecurity.com Published On :: Thu, 28 Dec 2017 15:49:52 GMT Full Article headline fraud mcafee twitter
y John McAfee's Unhackable Bitcoin Wallet Is Hackable, Company Admits By packetstormsecurity.com Published On :: Fri, 31 Aug 2018 13:42:57 GMT Full Article headline flaw mcafee cryptography
y Lynis Auditing Tool 2.7.5 By packetstormsecurity.com Published On :: Mon, 24 Jun 2019 23:28:32 GMT Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems. Full Article
y Scapy Packet Manipulation Tool 2.4.3rc2 By packetstormsecurity.com Published On :: Tue, 02 Jul 2019 14:10:41 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
y Scapy Packet Manipulation Tool 2.4.3rc3 By packetstormsecurity.com Published On :: Fri, 12 Jul 2019 11:58:46 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
y Scapy Packet Manipulation Tool 2.4.3rc4 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:30:52 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
y Scapy Packet Manipulation Tool 2.4.3 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:38:28 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
y Wapiti Web Application Vulnerability Scanner 3.0.2 By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 23:59:02 GMT Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities. Full Article
y Wapiti Web Application Vulnerability Scanner 3.0.3 By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:41:20 GMT Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities. Full Article
y Ubuntu Security Notice USN-4184-2 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:13 GMT Ubuntu Security Notice 4184-2 - USN-4184-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. Also, the update introduced a regression that broke KVM guests where extended page tables are disabled or not supported. This update addresses both issues. Various other issues were also addressed. Full Article
y Ubuntu Security Notice USN-4183-2 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:18 GMT Ubuntu Security Notice 4183-2 - USN-4183-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. This update addresses the issue. Various other issues were also addressed. Full Article
y Ubuntu Security Notice USN-4185-3 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:24 GMT Ubuntu Security Notice 4185-3 - USN-4185-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. Also, the update introduced a regression that broke KVM guests where extended page tables are disabled or not supported. This update addresses both issues. Various other issues were also addressed. Full Article
y Ubuntu Security Notice USN-4186-3 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:56:10 GMT Ubuntu Security Notice 4186-3 - USN-4186-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. This update addresses the issue. Various other issues were also addressed. Full Article
y Dismantling Megamos Crypto: Wirelessly Lockpicking A Vehicle Immobilizer By packetstormsecurity.com Published On :: Fri, 14 Aug 2015 13:02:14 GMT The Megamos Crypto transponder is used in one of the most widely deployed electronic vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and Volvo cars. Such an immobilizer is an anti-theft device which prevents the engine of the vehicle from starting when the corresponding transponder is not present. This transponder is a passive RFID tag which is embedded in the key of the vehicle. In this paper, the authors have reverse-engineered all proprietary security mechanisms of the transponder, including the cipher and the authentication protocol which we publish here in full detail. This article reveals several weaknesses in the design of the cipher, the authentication protocol and also in their implementation. Full Article
y RSA BSAFE Crypto Attacks / Denial Of Service By packetstormsecurity.com Published On :: Mon, 17 Aug 2015 16:07:08 GMT RSA BSAFE Micro Edition Suite, Crypto-C Micro Edition, Crypto-J, SSL-J and SSL-C all suffer from various crypto, denial of service, and underflow vulnerabilities. Full Article
y FreeBSD Security Advisory - ntp Authentication Bypass By packetstormsecurity.com Published On :: Mon, 26 Oct 2015 19:32:22 GMT FreeBSD Security Advisory - Crypto-NAK packets can be used to cause ntpd(8) to accept time from an unauthenticated ephemeral symmetric peer by bypassing the authentication required to mobilize peer associations. FreeBSD 9.3 and 10.1 are not affected. Various other issues have also been addressed. Full Article
y Debian Security Advisory 3417-1 By packetstormsecurity.com Published On :: Mon, 14 Dec 2015 16:40:50 GMT Debian Linux Security Advisory 3417-1 - Tibor Jager, Jorg Schwenk, and Juraj Somorovsky, from Horst Gortz Institute for IT Security, published a paper in ESORICS 2015 where they describe an invalid curve attack in Bouncy Castle Crypto, a Java library for cryptography. An attacker is able to recover private Elliptic Curve keys from different applications, for example, TLS servers. Full Article
y XMB - eXtreme Message Board 1.9.11.13 Weak Crypto / Insecure Password Storage By packetstormsecurity.com Published On :: Sat, 23 Jan 2016 13:03:33 GMT XMB - eXtreme Message Board version 1.9.11.13 suffers from weak crypto and insecure password storage vulnerabilities. Full Article
y Debian Security Advisory 3457-1 By packetstormsecurity.com Published On :: Thu, 28 Jan 2016 17:19:51 GMT Debian Linux Security Advisory 3457-1 - Multiple security issues have been found in Iceweasel, Debian's version buffer overflow may lead to the execution of arbitrary code. In addition the bundled NSS crypto library addresses the SLOTH attack on TLS 1.2. Full Article
y XOOPS 2.5.7.2 Weak Crypto By packetstormsecurity.com Published On :: Fri, 18 Mar 2016 22:22:22 GMT XOOPS version 2.5.7.2 uses weak one way hash crypto MD5 along with unsalted passwords stored in the database. Full Article
y Apple Security Advisory 2016-03-21-7 By packetstormsecurity.com Published On :: Tue, 22 Mar 2016 15:23:11 GMT Apple Security Advisory 2016-03-21-7 - OS X Server 5.1 is now available and addresses RC4 crypto weaknesses, file access, and information disclosure vulnerabilities. Full Article
y RSA BSAFE Crypto-J Cryptography Failure By packetstormsecurity.com Published On :: Sat, 28 Jan 2017 05:05:55 GMT RSA BSAFE Crypto-J versions prior to 6.2.2 suffer from improper OCSP validation and PKCS#12 timing attack vulnerabilities. Full Article
y Ubiquiti Networks UniFi Cloud Key Command Injection / Privilege Escalation By packetstormsecurity.com Published On :: Thu, 27 Jul 2017 18:22:22 GMT Ubiquiti Networks UniFi Cloud Key with firmware versions 0.5.9 and 0.6.0 suffer from weak crypto, privilege escalation, and command injection vulnerabilities. Full Article
y Ubuntu Security Notice USN-3199-3 By packetstormsecurity.com Published On :: Mon, 28 Aug 2017 21:11:00 GMT Ubuntu Security Notice 3199-3 - USN-3199-1 fixed a vulnerability in Python Crypto. This update provides the corresponding update for Ubuntu 12.04 ESM. A It was discovered that the ALGnew function in block_templace.c in the A Python Cryptography Toolkit contained a heap-based buffer overflow A vulnerability. A remote attacker could use this flaw to execute A arbitrary code by using a crafted initialization vector parameter. Various other issues were also addressed. Full Article
y Debian Security Advisory 3967-1 By packetstormsecurity.com Published On :: Fri, 08 Sep 2017 13:34:00 GMT Debian Linux Security Advisory 3967-1 - An authentication bypass vulnerability was discovered in mbed TLS, a lightweight crypto and SSL/TLS library, when the authentication mode is configured as 'optional'. A remote attacker can take advantage of this flaw to mount a man-in-the-middle attack and impersonate an intended peer via an X.509 certificate chain with many intermediates. Full Article
y Key Reinstallation: Forcing Nonce Reuse In WPA2 By packetstormsecurity.com Published On :: Mon, 16 Oct 2017 13:34:29 GMT Whitepaper called Reinstallation Attacks: Forcing Nonce Reuse in WPA2. This research paper will be presented on at the Computer and Communications Security (CCS) conference on November 1, 2017. This paper details a flaw in the WPA2 protocol itself and most devices that makes use of WPA2 are affected. Full Article
y Debian Security Advisory 4138-1 By packetstormsecurity.com Published On :: Thu, 15 Mar 2018 15:57:24 GMT Debian Linux Security Advisory 4138-1 - Several vulnerabilities were discovered in mbed TLS, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code. Full Article
y Debian Security Advisory 4147-1 By packetstormsecurity.com Published On :: Thu, 22 Mar 2018 22:23:00 GMT Debian Linux Security Advisory 4147-1 - Several vulnerabilities were discovered in PolarSSL, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code. Full Article
y Ubuntu Security Notice USN-3616-1 By packetstormsecurity.com Published On :: Tue, 03 Apr 2018 18:19:00 GMT Ubuntu Security Notice 3616-1 - It was discovered that Python Crypto incorrectly generated ElGamal key parameters. A remote attacker could possibly use this issue to obtain sensitive information. Full Article
y Ubuntu Security Notice USN-3616-2 By packetstormsecurity.com Published On :: Mon, 09 Apr 2018 16:41:45 GMT Ubuntu Security Notice 3616-2 - USN-3616-1 fixed a vulnerability in Python Crypto. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that Python Crypto incorrectly generated ElGamal key parameters. A remote attacker could possibly use this issue to obtain sensitive information. Various other issues were also addressed. Full Article