y Samhain File Integrity Checker 4.4.0 By packetstormsecurity.com Published On :: Thu, 31 Oct 2019 22:21:09 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
y Samhain File Integrity Checker 4.4.1 By packetstormsecurity.com Published On :: Thu, 27 Feb 2020 19:19:51 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
y systemx.txt By packetstormsecurity.com Published On :: Sat, 15 Apr 2000 05:30:57 GMT bt systemx switch administration and overview of bt telcom operations and maintanance centers, written for f41th magazine. the system is based on a vax/vms platform with multi-level oracle databases, a look into the man-machine interface of uk switching, and remote switch/node interfaces. Full Article
y sysuaf.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:56:24 GMT The VAX/VMS SYSUAF.DAT file Full Article
y Linux's systemd Vulnerable To DNS Server Attack By packetstormsecurity.com Published On :: Thu, 29 Jun 2017 14:03:10 GMT Full Article headline linux dns flaw
y Another Day, Another Mass Domain Hijacking By packetstormsecurity.com Published On :: Sat, 15 Jul 2017 13:48:53 GMT Full Article headline hacker dns
y The Internet Is Not Ready For DNS SEC By packetstormsecurity.com Published On :: Fri, 29 Sep 2017 14:32:04 GMT Full Article headline dns cryptography
y Hacker's Hijack Security Firm Fox-IT's Domain By packetstormsecurity.com Published On :: Tue, 19 Dec 2017 14:21:52 GMT Full Article headline hacker dns
y DNS Requests Are Routinely Spied On By packetstormsecurity.com Published On :: Mon, 20 Aug 2018 15:50:44 GMT Full Article headline privacy dns spyware
y GoDaddy Weakness Let Domains Be Hijacked By packetstormsecurity.com Published On :: Wed, 23 Jan 2019 15:19:15 GMT Full Article headline privacy dns cybercrime fraud
y State-Sponsored DNS Hijacking Infiltrates 40 Firms Globally By packetstormsecurity.com Published On :: Thu, 18 Apr 2019 13:07:29 GMT Full Article headline hacker government dns cyberwar
y Vast Majority Of Newly Registered Domains Are Malicious By packetstormsecurity.com Published On :: Thu, 22 Aug 2019 15:44:39 GMT Full Article headline dns cybercrime fraud
y Why Big ISPs Aren't Happy About Google's Plans For Encrypted DNS By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 13:50:11 GMT Full Article headline privacy dns google
y Over 28,000 Web Domains Suspended For Criminal Activity By packetstormsecurity.com Published On :: Fri, 22 Nov 2019 15:38:30 GMT Full Article headline dns cybercrime fraud
y Microsoft Takes Down 50 Domains Operated By North Korean Hackers By packetstormsecurity.com Published On :: Tue, 31 Dec 2019 14:51:18 GMT Full Article headline hacker microsoft dns cyberwar korea
y Firefox Turns On Encrypted DNS By Default To Thwart Snooping ISPs By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:00:05 GMT Full Article headline privacy dns mozilla firefox cryptography
y GoDaddy Hack Breaches Hosting Account Credentials By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:31:15 GMT Full Article headline hacker privacy dns data loss password
y Johnny You Are Fired By packetstormsecurity.com Published On :: Wed, 01 May 2019 14:44:44 GMT This archive contains proof of concepts and a whitepaper that describes multiple email client implementations where popular clients for email are vulnerable to signature spoofing attacks. Full Article
y Ubuntu Security Notice USN-3964-1 By packetstormsecurity.com Published On :: Thu, 02 May 2019 20:51:59 GMT Ubuntu Security Notice 3964-1 - Marcus Brinkmann discovered that GnuPG before 2.2.8 improperly handled certain command line parameters. A remote attacker could use this to spoof the output of GnuPG and cause unsigned e-mail to appear signed. It was discovered that python-gnupg incorrectly handled the GPG passphrase. A remote attacker could send a specially crafted passphrase that would allow them to control the output of encryption and decryption operations. Various other issues were also addressed. Full Article
y Ubuntu Security Notice USN-3991-1 By packetstormsecurity.com Published On :: Tue, 21 May 2019 23:06:42 GMT Ubuntu Security Notice 3991-1 - Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, spoof the browser UI, trick the user in to launching local executable binaries, obtain sensitive information, conduct cross-site scripting attacks, or execute arbitrary code. Various other issues were also addressed. Full Article
y Debian Security Advisory 4457-1 By packetstormsecurity.com Published On :: Fri, 07 Jun 2019 23:22:22 GMT Debian Linux Security Advisory 4457-1 - Hanno Böck discovered that Evolution was vulnerable to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted HTML email. This issue was mitigated by moving the security bar with encryption and signature information above the message headers. Full Article
y Debian Security Advisory 4479-1 By packetstormsecurity.com Published On :: Fri, 12 Jul 2019 12:12:44 GMT Debian Linux Security Advisory 4479-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, cross-site scripting, spoofing, information disclosure, denial of service or cross-site request forgery. Full Article
y Ubuntu Security Notice USN-4054-1 By packetstormsecurity.com Published On :: Fri, 12 Jul 2019 12:22:22 GMT Ubuntu Security Notice 4054-1 - A sandbox escape was discovered in Firefox. If a user were tricked in to installing a malicious language pack, an attacker could exploit this to gain additional privileges. Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass same origin restrictions, conduct cross-site scripting attacks, conduct cross-site request forgery attacks, spoof origin attributes, spoof the addressbar contents, bypass safebrowsing protections, or execute arbitrary code. Various other issues were also addressed. Full Article
y Debian Security Advisory 4482-1 By packetstormsecurity.com Published On :: Mon, 15 Jul 2019 15:28:59 GMT Debian Linux Security Advisory 4482-1 - Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code, cross-site scripting, spoofing, information disclosure, denial of service or cross-site request forgery. Full Article
y SAPUI5 1.0.0 / SAP Gateway 7.5 / 7.51 / 7.52 / 7.53 Content Spoofing By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 02:22:22 GMT SAPUI5 version 1.0.0 and the SAP Gateway versions 7.5, 7.51, 7.52 and 7.53are vulnerable to content spoofing in multiple parameters. Full Article
y Ubuntu Security Notice USN-4064-1 By packetstormsecurity.com Published On :: Thu, 18 Jul 2019 18:58:22 GMT Ubuntu Security Notice 4064-1 - A sandbox escape was discovered in Thunderbird. If a user were tricked in to installing a malicious language pack, an attacker could exploit this to gain additional privileges. Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, bypass same origin restrictions, conduct cross-site scripting attacks, spoof origin attributes, or execute arbitrary code. Various other issues were also addressed. Full Article
y Ubuntu Security Notice USN-4054-2 By packetstormsecurity.com Published On :: Fri, 26 Jul 2019 11:11:11 GMT Ubuntu Security Notice 4054-2 - USN-4054-1 fixed vulnerabilities in Firefox. The update introduced various minor regressions. This update fixes the problems. A sandbox escape was discovered in Firefox. If a user were tricked in to installing a malicious language pack, an attacker could exploit this to gain additional privileges. Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass same origin restrictions, conduct cross-site scripting attacks, conduct cross-site request forgery attacks, spoof origin attributes, spoof the addressbar contents, bypass safebrowsing protections, or execute arbitrary code. It was discovered that Firefox treats all files in a directory as same origin. If a user were tricked in to downloading a specially crafted HTML file, an attacker could potentially exploit this to obtain sensitive information from local files. Various other issues were also addressed. Full Article
y Zyxel USG/UAG/ATP/VPN/NXC External DNS Requests By packetstormsecurity.com Published On :: Fri, 30 Aug 2019 15:57:35 GMT Zyxel USG/UAG/ATP/VPN/NXC series suffer from an issue where a DNS request can be made by an unauthenticated attacker to either spam a DNS service of a third party with requests that have a spoofed origin or probe whether domain names are present on the internal network behind the firewall. Full Article
y Debian Security Advisory 4524-1 By packetstormsecurity.com Published On :: Tue, 17 Sep 2019 16:47:28 GMT Debian Linux Security Advisory 4524-1 - Multiple vulnerabilities have been discovered in the Dino XMPP client, which could allow spoofing message, manipulation of a user's roster (contact list) and unauthorised sending of message carbons. Full Article
y Apple Security Advisory 2019-9-26-9 By packetstormsecurity.com Published On :: Sun, 29 Sep 2019 17:32:22 GMT Apple Security Advisory 2019-9-26-9 - Safari 13.0.1 addresses user interface spoofing and browser history leakage vulnerabilities. Full Article
y Ubuntu Security Notice USN-4202-2 By packetstormsecurity.com Published On :: Tue, 10 Dec 2019 23:02:29 GMT Ubuntu Security Notice 4202-2 - USN-4202-1 fixed vulnerabilities in Thunderbird. After upgrading, Thunderbird created a new profile for some users. This update fixes the problem. It was discovered that a specially crafted S/MIME message with an inner encryption layer could be displayed as having a valid signature in some circumstances, even if the signer had no access to the encrypted message. An attacker could potentially exploit this to spoof the message author. Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, bypass security restrictions, bypass same-origin restrictions, conduct cross-site scripting attacks, or execute arbitrary code. A heap overflow was discovered in the expat library in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit this to cause a denial of service, or execute arbitrary code. Full Article
y CurveBall Microsoft Windows CryptoAPI Spoofing Proof Of Concept By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:16:02 GMT This is a proof of concept exploit that demonstrates the Microsoft Windows CryptoAPI spoofing vulnerability as described in CVE-2020-0601 and disclosed by the NSA. Full Article
y Apple Security Advisory 2020-1-28-5 By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 17:16:14 GMT Apple Security Advisory 2020-1-28-5 - Safari 13.0.5 is now available and addresses address bar spoofing and password disclosure in transit issues. Full Article
y Google Invisible RECAPTCHA 3 Spoof Bypass By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 15:23:32 GMT Google Invisible RECAPTCHA version 3 suffers from a spoofing bypass vulnerability. Full Article
y Ubuntu Security Notice USN-4299-1 By packetstormsecurity.com Published On :: Thu, 12 Mar 2020 20:12:03 GMT Ubuntu Security Notice 4299-1 - Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, spoof the URL or other browser chrome, obtain sensitive information, bypass Content Security Policy protections, or execute arbitrary code. Various other issues were also addressed. Full Article
y Red Hat Security Advisory 2020-1080-01 By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 22:22:22 GMT Red Hat Security Advisory 2020-1080-01 - Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Issues addressed include OpenPGP signature spoofing and certificate errors being ignored. Full Article
y Red Hat Security Advisory 2020-1600-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:24:19 GMT Red Hat Security Advisory 2020-1600-01 - Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications. Issues addressed include a spoofing vulnerability. Full Article
y Red Hat Security Advisory 2020-1047-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:10:20 GMT Red Hat Security Advisory 2020-1047-01 - The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network. Issues addressed include crash and out of bounds read vulnerabilities. Full Article
y Red Hat Security Advisory 2020-1084-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:11:25 GMT Red Hat Security Advisory 2020-1084-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information. Full Article
y Red Hat Security Advisory 2020-1167-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:12:28 GMT Red Hat Security Advisory 2020-1167-01 - Network Block Device is a protocol for accessing hard disks and other disk-like devices over the network. The nbdkit toolkit utilizes NBD to create servers with minimal dependencies. The package contains plug-in support for the C and Python programming languages. Issues addressed include a denial of service vulnerability. Full Article
y Red Hat Security Advisory 2020-1081-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:12:38 GMT Red Hat Security Advisory 2020-1081-01 - The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol, including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base browser. Issues addressed include denial of service and null pointer vulnerabilities. Full Article
y Red Hat Security Advisory 2020-1045-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:15:59 GMT Red Hat Security Advisory 2020-1045-01 - LFTP is a file transfer utility for File Transfer Protocol, Secure File Transfer Protocol, Hypertext Transfer Protocol, and other commonly used protocols. It uses the readline library for input, and provides support for bookmarks, built-in monitoring, job control, and parallel transfer of multiple files at the same time. Full Article
y Gentoo Linux Security Advisory 202004-06 By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 02:51:49 GMT Gentoo Linux Security Advisory 202004-6 - A regression in GnuTLS breaks the security guarantees of the DTLS protocol. Versions less than 3.6.13 are affected. Full Article
y Red Hat Security Advisory 2020-1318-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:30:11 GMT Red Hat Security Advisory 2020-1318-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. An arbitrary code execution vulnerability was addressed. Full Article
y Red Hat Security Advisory 2020-1335-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:54:37 GMT Red Hat Security Advisory 2020-1335-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. An arbitrary code execution vulnerability was addressed. Full Article
y Red Hat Security Advisory 2020-1334-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:58:34 GMT Red Hat Security Advisory 2020-1334-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. An arbitrary code execution vulnerability was addressed. Full Article
y Red Hat Security Advisory 2020-1342-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:40:28 GMT Red Hat Security Advisory 2020-1342-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. Issues addressed include a code execution vulnerability. Full Article
y Red Hat Security Advisory 2020-1445-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:39:41 GMT Red Hat Security Advisory 2020-1445-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.4.3 serves as a replacement for Red Hat AMQ Broker 7.4.2, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include cross site scripting, denial of service, and information leakage vulnerabilities. Full Article
y Red Hat Security Advisory 2020-1470-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 23:09:22 GMT Red Hat Security Advisory 2020-1470-01 - The Network Time Protocol is used to synchronize a computer's time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service. Issues addressed include buffer overflow, code execution, and denial of service vulnerabilities. Full Article
y Red Hat Security Advisory 2020-1840-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:18:54 GMT Red Hat Security Advisory 2020-1840-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include an information leakage vulnerability. Full Article