so Debian Security Advisory 4482-1 By packetstormsecurity.com Published On :: Mon, 15 Jul 2019 15:28:59 GMT Debian Linux Security Advisory 4482-1 - Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code, cross-site scripting, spoofing, information disclosure, denial of service or cross-site request forgery. Full Article
so Debian Security Advisory 4524-1 By packetstormsecurity.com Published On :: Tue, 17 Sep 2019 16:47:28 GMT Debian Linux Security Advisory 4524-1 - Multiple vulnerabilities have been discovered in the Dino XMPP client, which could allow spoofing message, manipulation of a user's roster (contact list) and unauthorised sending of message carbons. Full Article
so Apple Security Advisory 2019-9-26-9 By packetstormsecurity.com Published On :: Sun, 29 Sep 2019 17:32:22 GMT Apple Security Advisory 2019-9-26-9 - Safari 13.0.1 addresses user interface spoofing and browser history leakage vulnerabilities. Full Article
so CurveBall Microsoft Windows CryptoAPI Spoofing Proof Of Concept By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:16:02 GMT This is a proof of concept exploit that demonstrates the Microsoft Windows CryptoAPI spoofing vulnerability as described in CVE-2020-0601 and disclosed by the NSA. Full Article
so Apple Security Advisory 2020-1-28-5 By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 17:16:14 GMT Apple Security Advisory 2020-1-28-5 - Safari 13.0.5 is now available and addresses address bar spoofing and password disclosure in transit issues. Full Article
so Red Hat Security Advisory 2020-1080-01 By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 22:22:22 GMT Red Hat Security Advisory 2020-1080-01 - Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Issues addressed include OpenPGP signature spoofing and certificate errors being ignored. Full Article
so Red Hat Security Advisory 2020-1600-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:24:19 GMT Red Hat Security Advisory 2020-1600-01 - Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications. Issues addressed include a spoofing vulnerability. Full Article
so Red Hat Security Advisory 2020-1047-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:10:20 GMT Red Hat Security Advisory 2020-1047-01 - The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network. Issues addressed include crash and out of bounds read vulnerabilities. Full Article
so Red Hat Security Advisory 2020-1084-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:11:25 GMT Red Hat Security Advisory 2020-1084-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information. Full Article
so Red Hat Security Advisory 2020-1167-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:12:28 GMT Red Hat Security Advisory 2020-1167-01 - Network Block Device is a protocol for accessing hard disks and other disk-like devices over the network. The nbdkit toolkit utilizes NBD to create servers with minimal dependencies. The package contains plug-in support for the C and Python programming languages. Issues addressed include a denial of service vulnerability. Full Article
so Red Hat Security Advisory 2020-1081-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:12:38 GMT Red Hat Security Advisory 2020-1081-01 - The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol, including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base browser. Issues addressed include denial of service and null pointer vulnerabilities. Full Article
so Red Hat Security Advisory 2020-1045-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:15:59 GMT Red Hat Security Advisory 2020-1045-01 - LFTP is a file transfer utility for File Transfer Protocol, Secure File Transfer Protocol, Hypertext Transfer Protocol, and other commonly used protocols. It uses the readline library for input, and provides support for bookmarks, built-in monitoring, job control, and parallel transfer of multiple files at the same time. Full Article
so Gentoo Linux Security Advisory 202004-06 By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 02:51:49 GMT Gentoo Linux Security Advisory 202004-6 - A regression in GnuTLS breaks the security guarantees of the DTLS protocol. Versions less than 3.6.13 are affected. Full Article
so Red Hat Security Advisory 2020-1318-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:30:11 GMT Red Hat Security Advisory 2020-1318-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. An arbitrary code execution vulnerability was addressed. Full Article
so Red Hat Security Advisory 2020-1335-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:54:37 GMT Red Hat Security Advisory 2020-1335-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. An arbitrary code execution vulnerability was addressed. Full Article
so Red Hat Security Advisory 2020-1334-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:58:34 GMT Red Hat Security Advisory 2020-1334-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. An arbitrary code execution vulnerability was addressed. Full Article
so Red Hat Security Advisory 2020-1342-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:40:28 GMT Red Hat Security Advisory 2020-1342-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. Issues addressed include a code execution vulnerability. Full Article
so Red Hat Security Advisory 2020-1445-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:39:41 GMT Red Hat Security Advisory 2020-1445-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.4.3 serves as a replacement for Red Hat AMQ Broker 7.4.2, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include cross site scripting, denial of service, and information leakage vulnerabilities. Full Article
so Red Hat Security Advisory 2020-1470-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 23:09:22 GMT Red Hat Security Advisory 2020-1470-01 - The Network Time Protocol is used to synchronize a computer's time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service. Issues addressed include buffer overflow, code execution, and denial of service vulnerabilities. Full Article
so Red Hat Security Advisory 2020-1840-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:18:54 GMT Red Hat Security Advisory 2020-1840-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include an information leakage vulnerability. Full Article
so Red Hat Security Advisory 2020-1878-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:21:10 GMT Red Hat Security Advisory 2020-1878-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information. Full Article
so Red Hat Security Advisory 2020-1845-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:34:31 GMT Red Hat Security Advisory 2020-1845-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Full Article
so Red Hat Security Advisory 2020-1998-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 23:46:22 GMT Red Hat Security Advisory 2020-1998-01 - The gnutls packages provide the GNU Transport Layer Security library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. An issue was addressed where the DTLS client hello contains a random value of all zeroes. Full Article
so Hashcat Advanced Password Recovery 4.0.0 Source Code By packetstormsecurity.com Published On :: Fri, 27 Oct 2017 18:18:15 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
so Hashcat Advanced Password Recovery 4.0.1 Source Code By packetstormsecurity.com Published On :: Tue, 07 Nov 2017 16:20:23 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
so Hashcat Advanced Password Recovery 4.1.0 Source Code By packetstormsecurity.com Published On :: Wed, 21 Feb 2018 14:04:26 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
so Hashcat Advanced Password Recovery 4.2.0 Source Code By packetstormsecurity.com Published On :: Fri, 03 Aug 2018 02:31:24 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
so Hashcat Advanced Password Recovery 4.2.1 Source Code By packetstormsecurity.com Published On :: Tue, 07 Aug 2018 23:56:22 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
so Hashcat Advanced Password Recovery 5.0.0 Source Code By packetstormsecurity.com Published On :: Mon, 29 Oct 2018 15:56:21 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
so Hashcat Advanced Password Recovery 5.1.0 Source Code By packetstormsecurity.com Published On :: Tue, 04 Dec 2018 05:06:30 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
so Gadgets Can Be Hacked To Produce Dangerous Sounds By packetstormsecurity.com Published On :: Sun, 11 Aug 2019 18:14:53 GMT Full Article headline flaw cyberwar science conference
so Amazon's Rekognition Software Can Now Spot Fear By packetstormsecurity.com Published On :: Thu, 15 Aug 2019 16:15:39 GMT Full Article headline amazon science
so Team That Made Gene-Edited Babies Sentenced To Prison, Fined By packetstormsecurity.com Published On :: Thu, 02 Jan 2020 16:04:59 GMT Full Article headline china fraud science
so British Airways E-Ticketing Flaw Exposes Passenger Flight, Personal Data By packetstormsecurity.com Published On :: Tue, 13 Aug 2019 14:29:35 GMT Full Article headline privacy britain data loss terror
so Morrisons Is To Blame For 100k Payroll Theft And Leak By packetstormsecurity.com Published On :: Sat, 09 Nov 2019 13:44:36 GMT Full Article headline hacker privacy britain data loss
so Hacker Who Blackmailed Apple In 2017 Gets No Prison Time By packetstormsecurity.com Published On :: Sat, 21 Dec 2019 06:49:02 GMT Full Article headline hacker britain fraud apple
so German Election Voting Software Riddled With Holes By packetstormsecurity.com Published On :: Fri, 08 Sep 2017 14:57:44 GMT Full Article headline government fraud flaw germany
so Delta Industrial Automation DCISoft 1.12.09 Stack Buffer Overflow By packetstormsecurity.com Published On :: Sun, 14 Feb 2016 01:26:22 GMT Delta Industrial Automation DCISoft version 1.12.09 suffers from a stack buffer overflow vulnerability. Full Article
so France Warns Microsoft To Stop Snooping On Windows 10 Users By packetstormsecurity.com Published On :: Thu, 21 Jul 2016 15:17:33 GMT Full Article headline privacy microsoft spyware france
so French Hospital Contracts 6,000 PC-Locking Ransomware Infections By packetstormsecurity.com Published On :: Sun, 24 Nov 2019 20:33:15 GMT Full Article headline malware cybercrime fraud france terror cryptography
so Zero Day Initiative Advisory 11-109 By packetstormsecurity.com Published On :: Tue, 22 Mar 2011 20:31:31 GMT Zero Day Initiative Advisory 11-109 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari on the iPhone. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the support for parsing Office files. When handling the OfficeArtMetafileHeader the process trusts the cbSize field and performs arithmetic on it before making an allocation. As the result is not checked for overflow, the subsequent allocation can be undersized. Later when copying into this buffer, memory can be corrupted leading to arbitrary code execution under the context of the mobile user on the iPhone. Full Article
so Secunia Security Advisory 43832 By packetstormsecurity.com Published On :: Thu, 24 Mar 2011 08:52:53 GMT Secunia Security Advisory - A vulnerability has been reported in Apple iPhone iOS, which can be exploited by malicious people to compromise a vulnerable device. Full Article
so Secunia Security Advisory 44154 By packetstormsecurity.com Published On :: Sun, 17 Apr 2011 06:25:13 GMT Secunia Security Advisory - Some vulnerabilities has been reported in Apple iOS for iPhone 4 (CDMA), which can be exploited by malicious people to compromise a vulnerable device. Full Article
so IPhone TreasonSMS HTML Injection / File Inclusion By packetstormsecurity.com Published On :: Mon, 23 Apr 2012 18:55:33 GMT IPhone TreasonSMS suffers from html injection and file inclusion vulnerabilities. Full Article
so Packet Storm Advisory 2013-0903-1 - Apple Safari Heap Buffer Overflow By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:55:53 GMT A heap memory buffer overflow vulnerability exists within the WebKit's JavaScriptCore JSArray::sort(...) method. This method accepts the user-defined JavaScript function and calls it from the native code to compare array items. If this compare function reduces array length, then the trailing array items will be written outside the "m_storage->m_vector[]" buffer, which leads to the heap memory corruption. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
so Microsoft Patches 0-Day Vulnerabilities In IE And Exchange By packetstormsecurity.com Published On :: Wed, 13 Feb 2019 15:01:51 GMT Full Article headline microsoft email flaw patch
so Hackers Could Read Your Hotmail, MSN, And Outlook Emails By Abusing Microsoft Support By packetstormsecurity.com Published On :: Mon, 15 Apr 2019 16:32:54 GMT Full Article headline hacker privacy microsoft email flaw
so Microsoft Outlook Email Breach Targeted Cryptocurrency Users By packetstormsecurity.com Published On :: Tue, 30 Apr 2019 00:59:50 GMT Full Article headline hacker privacy microsoft email data loss cryptography
so The Russians Are Using A Clever Microsoft Exchange Backdoor By packetstormsecurity.com Published On :: Tue, 07 May 2019 14:34:46 GMT Full Article headline government microsoft email russia cyberwar spyware backdoor
so Microsoft Warns Of Email Attacks Executing Code Using An Old Bug By packetstormsecurity.com Published On :: Tue, 11 Jun 2019 14:55:53 GMT Full Article headline malware microsoft email flaw