ty Facebook To Notify Users Of Third-Party App Logins By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 17:03:35 GMT Full Article headline privacy password facebook social
ty Facebook's Sir Nick Clegg Criticized Over WhatsApp Security By packetstormsecurity.com Published On :: Fri, 24 Jan 2020 16:52:25 GMT Full Article headline hacker privacy flaw facebook cryptography
ty Google Chrome 80 JSCreate Side-Effect Type Confusion By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 14:45:47 GMT This Metasploit module exploits an issue in Google Chrome version 80.0.3987.87 (64 bit). The exploit corrupts the length of a float array (float_rel), which can then be used for out of bounds read and write on adjacent memory. The relative read and write is then used to modify a UInt64Array (uint64_aarw) which is used for read and writing from absolute memory. The exploit then uses WebAssembly in order to allocate a region of RWX memory, which is then replaced with the payload shellcode. The payload is executed within the sandboxed renderer process, so the browser must be run with the --no-sandbox option for the payload to work correctly. Full Article
ty Google's Bug Bounty Program Just Had A Record-Breaking Year Of Payouts By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 15:36:03 GMT Full Article headline hacker flaw google
ty QRadar Community Edition 7.3.1.6 Arbitrary Object Instantiation By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:15:08 GMT QRadar Community Edition version 7.3.1.6 is vulnerable to instantiation of arbitrary objects based on user-supplied input. An authenticated attacker can abuse this to perform various types of attacks including server-side request forgery and (potentially) arbitrary execution of code. Full Article
ty Romanians Plead Guilty To Credit Card Hack On US Subway Shops By packetstormsecurity.com Published On :: Tue, 18 Sep 2012 15:02:35 GMT Full Article headline bank cybercrime fraud romania
ty Celebrity Email Cracker Guccifer Gets Cuffed By packetstormsecurity.com Published On :: Thu, 23 Jan 2014 03:08:49 GMT Full Article headline hacker privacy email data loss romania
ty Red Hat Security Advisory 2020-1975-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:37 GMT Red Hat Security Advisory 2020-1975-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
ty Red Hat Security Advisory 2020-1979-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:52 GMT Red Hat Security Advisory 2020-1979-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
ty Red Hat Security Advisory 2020-1978-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:05 GMT Red Hat Security Advisory 2020-1978-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
ty Red Hat Security Advisory 2020-1980-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:13 GMT Red Hat Security Advisory 2020-1980-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
ty Red Hat Security Advisory 2020-1422-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:30 GMT Red Hat Security Advisory 2020-1422-01 - This release of Red Hat build of Eclipse Vert.x 3.9.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Full Article
ty Symantec Warns On Credit Card Security Phishing Scam By packetstormsecurity.com Published On :: Wed, 17 Apr 2013 14:55:05 GMT Full Article headline bank cybercrime scam symantec phish
ty Malware Boom Forces Security Vendors To Roll Out Upgrades Every 40 Minutes By packetstormsecurity.com Published On :: Tue, 08 Apr 2014 15:31:05 GMT Full Article headline malware virus cybercrime fraud symantec
ty Symantec Fires Employees Over Issuing Rogue Google Security Certificates By packetstormsecurity.com Published On :: Mon, 21 Sep 2015 15:22:31 GMT Full Article headline cybercrime fraud google symantec cryptography
ty Flaws Found In Security Products AVG, Symantec, And McAfee By packetstormsecurity.com Published On :: Wed, 20 Jul 2016 16:36:21 GMT Full Article headline malware virus flaw symantec mcafee
ty Symantec Tricked Into Removing Legit Certificates By Security Researcher By packetstormsecurity.com Published On :: Fri, 21 Jul 2017 16:54:21 GMT Full Article headline hacker symantec cryptography
ty Cisco Re-Issues Patch For High Severity WebEx Flaw By packetstormsecurity.com Published On :: Wed, 28 Nov 2018 01:01:13 GMT Full Article headline flaw patch cisco
ty Cisco Patches High Severity Flaws In IP Phones By packetstormsecurity.com Published On :: Thu, 21 Mar 2019 13:05:46 GMT Full Article headline flaw patch cisco
ty High Severity Cisco Flaw In IOS XE Enables Device Takeover By packetstormsecurity.com Published On :: Thu, 13 Jun 2019 16:06:55 GMT Full Article headline flaw cisco
ty Cisco Tackles SD-WAN Root Privilege Vulnerability By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:12:51 GMT Full Article headline flaw patch cisco
ty Apple Security Advisory 2019-7-23-1 By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 18:22:22 GMT Apple Security Advisory 2019-7-23-1 - iCloud for Windows 7.13 is now available and addresses code execution and cross site scripting vulnerabilities. Full Article
ty Microsoft Windows Internet Settings Security Feature Bypass By packetstormsecurity.com Published On :: Tue, 17 Sep 2019 16:50:38 GMT Microsoft Windows suffers from an Internet Settings misconfiguration security feature bypass vulnerability. Versions affected include Windows 7 SP1, 8.0, 8.1 x86 and x64 with full patches up to July 2019. Full Article
ty Apple Security Advisory 2019-10-07-4 By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 20:44:48 GMT Apple Security Advisory 2019-10-07-4 - iCloud for Windows 7.14 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities. Full Article
ty Red Hat Security Advisory 2019-1790-01 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:10:26 GMT Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
ty Red Hat Security Advisory 2019-1942-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:17:37 GMT Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
ty Red Hat Security Advisory 2019-2097-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:11:21 GMT Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability. Full Article
ty Red Hat Security Advisory 2019-2400-01 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:08:30 GMT Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
ty Gentoo Linux Security Advisory 201909-01 By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 22:21:33 GMT Gentoo Linux Security Advisory 201909-1 - Multiple vulnerabilities have been found in Perl, the worst of which could result in the arbitrary execution of code. Versions less than 5.28.2 are affected. Full Article
ty Debian Security Advisory 4584-1 By packetstormsecurity.com Published On :: Mon, 16 Dec 2019 15:59:48 GMT Debian Linux Security Advisory 4584-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. Full Article
ty Red Hat Security Advisory 2020-1616-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:22:15 GMT Red Hat Security Advisory 2020-1616-01 - Irssi is a modular IRC client with Perl scripting. Issues addressed include a use-after-free vulnerability. Full Article
ty Boeing Code Leak Exposes Security Flaws Deep In 787s By packetstormsecurity.com Published On :: Fri, 09 Aug 2019 16:04:18 GMT Full Article headline flaw terror
ty Cybersecurity Lacking At Most Of The World's Major Airports By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:28:20 GMT Full Article headline hacker privacy data loss flaw terror
ty Red Hat Security Advisory 2020-1050-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:05:46 GMT Red Hat Security Advisory 2020-1050-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include a cross site request forgery vulnerability. Full Article
ty QRadar Community Edition 7.3.1.6 CSRF / Weak Access Control By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 19:57:06 GMT QRadar Community Edition version 7.3.1.6 suffers from cross site request forgery and weak access control vulnerabilities. Full Article
ty Smart TVs Riddled With DUMB Security Holes By packetstormsecurity.com Published On :: Thu, 06 Jun 2013 15:10:35 GMT Full Article headline flaw samsung
ty Google Reveals Samsung Galaxy S6 Edge's Security Flaws By packetstormsecurity.com Published On :: Wed, 04 Nov 2015 16:21:26 GMT Full Article headline phone flaw google samsung
ty RBS Pulls Samsung Galaxy S10 App Over Security Flaw By packetstormsecurity.com Published On :: Thu, 24 Oct 2019 18:49:18 GMT Full Article headline bank phone fraud flaw samsung
ty Astronaut Commits Identity Theft From Space By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 13:54:00 GMT Full Article headline bank fraud password identity theft
ty Microsoft Discloses Security Breach Of Customer Support Database By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 15:57:33 GMT Full Article headline hacker privacy microsoft data loss identity theft
ty Backdoor Found In Utility For Linux, Unix Servers By packetstormsecurity.com Published On :: Thu, 22 Aug 2019 15:44:35 GMT Full Article headline hacker flaw backdoor conference
ty Kr00k Vulnerability Could Allow Crooks To Intercept WiFi Data Packets By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 14:35:33 GMT Full Article headline wireless flaw conference rsa
ty Ubuntu Security Notice USN-4279-2 By packetstormsecurity.com Published On :: Thu, 20 Feb 2020 17:44:31 GMT Ubuntu Security Notice 4279-2 - USN-4279-1 fixed vulnerabilities in PHP. The updated packages caused a regression. This update fixes the problem. It was discovered that PHP incorrectly handled certain scripts. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04 LTS. It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information. It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 19.10. Various other issues were also addressed. Full Article
ty Gentoo Linux Security Advisory 202003-38 By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 21:59:56 GMT Gentoo Linux Security Advisory 202003-38 - A vulnerability in Imagick PHP extension might allow an attacker to execute arbitrary code. Versions less than 3.4.4 are affected. Full Article
ty Red Hat Security Advisory 2020-1112-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 14:58:12 GMT Red Hat Security Advisory 2020-1112-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Issues addressed include a cross site scripting vulnerability. Full Article
ty Ubuntu Security Notice USN-4330-1 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:42:29 GMT Ubuntu Security Notice 4330-1 - It was discovered that PHP incorrectly handled certain file uploads. An attacker could possibly use this issue to cause a crash. It was discovered that PHP incorrectly handled certain PHAR archive files. An attacker could possibly use this issue to access sensitive information. It was discovered that PHP incorrectly handled certain EXIF files. An attacker could possibly use this issue to access sensitive information or cause a crash. Various other issues were also addressed. Full Article
ty QRadar Community Edition 7.3.1.6 PHP Object Injection By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:13:50 GMT QRadar Community Edition version 7.3.1.6 suffers from a php object injection vulnerability. Full Article
ty FreeBSD Security Advisory - FreeBSD-SA-19:08.rack By packetstormsecurity.com Published On :: Fri, 21 Jun 2019 18:32:22 GMT FreeBSD Security Advisory - While processing acknowledgements, the RACK code uses several linked lists to maintain state entries. A malicious attacker can cause the lists to grow unbounded. This can cause an expensive list traversal on every packet being processed, leading to resource exhaustion and a denial of service. An attacker with the ability to send specially crafted TCP traffic to a victim system can degrade network performance and/or consume excessive CPU by exploiting the inefficiency of traversing the potentially very large RACK linked lists with relatively small bandwidth cost. Full Article
ty FreeBSD Security Advisory - FreeBSD-SA-19:09.iconv By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 18:20:31 GMT FreeBSD Security Advisory - With certain inputs, iconv may write beyond the end of the output buffer. Depending on the way in which iconv is used, an attacker may be able to create a denial of service, provoke incorrect program behavior, or induce a remote code execution. iconv is a libc library function and the nature of possible attacks will depend on the way in which iconv is used by applications or daemons. Full Article
ty FreeBSD Security Advisory - FreeBSD-SA-19:11.cd_ioctl By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 18:23:20 GMT FreeBSD Security Advisory - To implement one particular ioctl, the Linux emulation code used a special interface present in the cd(4) driver which allows it to copy subchannel information directly to a kernel address. This interface was erroneously made accessible to userland, allowing users with read access to a cd(4) device to arbitrarily overwrite kernel memory when some media is present in the device. A user in the operator group can make use of this interface to gain root privileges on a system with a cd(4) device when some media is present in the device. Full Article