ad John McAfee Flogging Crypto IM App Chadder By packetstormsecurity.com Published On :: Tue, 06 May 2014 00:24:20 GMT Full Article headline privacy mcafee nsa
ad McAfee Claims Ashley Madison Hack Could Destabilize Society By packetstormsecurity.com Published On :: Fri, 24 Jul 2015 14:24:46 GMT Full Article headline hacker privacy data loss mcafee
ad John McAfee's Unhackable Bitcoin Wallet Is Hackable, Company Admits By packetstormsecurity.com Published On :: Fri, 31 Aug 2018 13:42:57 GMT Full Article headline flaw mcafee cryptography
ad FreeBSD Security Advisory - ntp Authentication Bypass By packetstormsecurity.com Published On :: Mon, 26 Oct 2015 19:32:22 GMT FreeBSD Security Advisory - Crypto-NAK packets can be used to cause ntpd(8) to accept time from an unauthenticated ephemeral symmetric peer by bypassing the authentication required to mobilize peer associations. FreeBSD 9.3 and 10.1 are not affected. Various other issues have also been addressed. Full Article
ad Debian Security Advisory 3417-1 By packetstormsecurity.com Published On :: Mon, 14 Dec 2015 16:40:50 GMT Debian Linux Security Advisory 3417-1 - Tibor Jager, Jorg Schwenk, and Juraj Somorovsky, from Horst Gortz Institute for IT Security, published a paper in ESORICS 2015 where they describe an invalid curve attack in Bouncy Castle Crypto, a Java library for cryptography. An attacker is able to recover private Elliptic Curve keys from different applications, for example, TLS servers. Full Article
ad Debian Security Advisory 3457-1 By packetstormsecurity.com Published On :: Thu, 28 Jan 2016 17:19:51 GMT Debian Linux Security Advisory 3457-1 - Multiple security issues have been found in Iceweasel, Debian's version buffer overflow may lead to the execution of arbitrary code. In addition the bundled NSS crypto library addresses the SLOTH attack on TLS 1.2. Full Article
ad Apple Security Advisory 2016-03-21-7 By packetstormsecurity.com Published On :: Tue, 22 Mar 2016 15:23:11 GMT Apple Security Advisory 2016-03-21-7 - OS X Server 5.1 is now available and addresses RC4 crypto weaknesses, file access, and information disclosure vulnerabilities. Full Article
ad Debian Security Advisory 3967-1 By packetstormsecurity.com Published On :: Fri, 08 Sep 2017 13:34:00 GMT Debian Linux Security Advisory 3967-1 - An authentication bypass vulnerability was discovered in mbed TLS, a lightweight crypto and SSL/TLS library, when the authentication mode is configured as 'optional'. A remote attacker can take advantage of this flaw to mount a man-in-the-middle attack and impersonate an intended peer via an X.509 certificate chain with many intermediates. Full Article
ad Debian Security Advisory 4138-1 By packetstormsecurity.com Published On :: Thu, 15 Mar 2018 15:57:24 GMT Debian Linux Security Advisory 4138-1 - Several vulnerabilities were discovered in mbed TLS, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code. Full Article
ad Debian Security Advisory 4147-1 By packetstormsecurity.com Published On :: Thu, 22 Mar 2018 22:23:00 GMT Debian Linux Security Advisory 4147-1 - Several vulnerabilities were discovered in PolarSSL, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code. Full Article
ad Debian Security Advisory 4296-1 By packetstormsecurity.com Published On :: Tue, 18 Sep 2018 02:18:40 GMT Debian Linux Security Advisory 4296-1 - Two vulnerabilities were discovered in mbedtls, a lightweight crypto and SSL/TLS library which could result in plain text recovery via side-channel attacks. Full Article
ad WinExec Add-Admin Dynamic Null-Free Shellcode By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 15:58:21 GMT 210 bytes small WinExec add-admin dynamic null-free shellcode. Full Article
ad Aadhaar: Leak In World's Biggest Database Worries Indians By packetstormsecurity.com Published On :: Fri, 05 Jan 2018 15:50:02 GMT Full Article headline government privacy india data loss
ad Google's Bug Bounty Program Just Had A Record-Breaking Year Of Payouts By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 15:36:03 GMT Full Article headline hacker flaw google
ad Citrix ADC / Gateway Path Traversal By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:34:36 GMT This is an nmap nse script to test for the path traversal vulnerability in Citrix Application Delivery Controller (ADC) and Gateway. Full Article
ad Apache Tomcat AJP Ghostcat File Read / Inclusion By packetstormsecurity.com Published On :: Wed, 26 Feb 2020 07:22:22 GMT Apache Tomcat AJP Ghostcat file read and inclusion exploit. Full Article
ad Zen Load Balancer 3.10.1 Directory Traversal By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 21:34:01 GMT Zen Load Balancer version 3.10.1 suffers from a directory traversal vulnerability. This finding was originally discovered by Cody Sixteen. Full Article
ad QRadar Community Edition 7.3.1.6 Arbitrary Object Instantiation By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:15:08 GMT QRadar Community Edition version 7.3.1.6 is vulnerable to instantiation of arbitrary objects based on user-supplied input. An authenticated attacker can abuse this to perform various types of attacks including server-side request forgery and (potentially) arbitrary execution of code. Full Article
ad Romanians Plead Guilty To Credit Card Hack On US Subway Shops By packetstormsecurity.com Published On :: Tue, 18 Sep 2012 15:02:35 GMT Full Article headline bank cybercrime fraud romania
ad Romanian Man Extradited To U.S. To Face Hacking Charges By packetstormsecurity.com Published On :: Wed, 25 Mar 2015 13:47:48 GMT Full Article headline hacker government usa romania
ad Romanian CCTV Ransomware Culprit Admits Guilt By packetstormsecurity.com Published On :: Fri, 21 Sep 2018 15:12:38 GMT Full Article headline government malware usa fraud romania
ad UPLoad 7.0 Insecure Cookie Handling By packetstormsecurity.com Published On :: Tue, 16 Feb 2010 21:56:36 GMT UPLoad version 7.0 suffers from an insecure cookie handling vulnerability. Full Article
ad Ac4p.com Gallery 1.0 Cross Site Scripting / Shell Upload / Bypass / Disclosure By packetstormsecurity.com Published On :: Tue, 23 Feb 2010 07:00:24 GMT Ac4p.com Gallery version 1.0 suffers from cross site scripting, phpinfo disclosure, shell upload, and insecure cookie handling vulnerabilities. Full Article
ad Denapars Shop Script Bypass / Insecure Cookie / Shell Upload By packetstormsecurity.com Published On :: Wed, 31 Mar 2010 01:15:12 GMT Denapars Shop Script suffers from administrative bypass, shell upload, and insecure cookie handling vulnerabilities. Full Article
ad [whem]-UPLoad 7.0 Insecure Cookie By packetstormsecurity.com Published On :: Wed, 23 Jun 2010 05:19:38 GMT [whem]-UPLoad version 7.0 suffers from an insecure cookie handling vulnerability. Full Article
ad AV Arcade 3 Insecure Cookie / SQL Injection By packetstormsecurity.com Published On :: Wed, 28 Jul 2010 17:44:53 GMT AV Arcade version 3 suffers from insecure cookie and SQL injection vulnerabilities. Full Article
ad Tornado 1.0 Insecure Cookie By packetstormsecurity.com Published On :: Tue, 17 Aug 2010 01:14:15 GMT Tornado version 1.0 suffers from an insecure cookie vulnerability. Full Article
ad AV Arcade Pro 5.4.3 Cookie Manipulation By packetstormsecurity.com Published On :: Sat, 15 Oct 2011 23:46:31 GMT AV Arcade Pro version 5.4.3 suffers from an insecure cookie vulnerability that allows for access bypass. Full Article
ad Paddelberg Topsite Script Insecure Cookie By packetstormsecurity.com Published On :: Mon, 09 Jan 2012 20:53:57 GMT Paddelberg Topsite Script version 1.2.3 suffers from an authentication bypass vulnerability due to insecure cookie handling. Full Article
ad Totaljs CMS 12.0 Insecure Admin Session Cookie By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 23:20:22 GMT Totaljs CMS version 12.0 mints an insecure cookie that can be used to crack the administrator password. Full Article
ad Red Hat Security Advisory 2020-1975-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:37 GMT Red Hat Security Advisory 2020-1975-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
ad Red Hat Security Advisory 2020-1979-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:52 GMT Red Hat Security Advisory 2020-1979-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
ad Red Hat Security Advisory 2020-1978-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:05 GMT Red Hat Security Advisory 2020-1978-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
ad Red Hat Security Advisory 2020-1980-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:13 GMT Red Hat Security Advisory 2020-1980-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
ad Red Hat Security Advisory 2020-1422-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:30 GMT Red Hat Security Advisory 2020-1422-01 - This release of Red Hat build of Eclipse Vert.x 3.9.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Full Article
ad Symantec Finds Malware Widespread On Google Play Market By packetstormsecurity.com Published On :: Wed, 03 Apr 2013 04:10:50 GMT Full Article headline malware phone google symantec
ad Malware Boom Forces Security Vendors To Roll Out Upgrades Every 40 Minutes By packetstormsecurity.com Published On :: Tue, 08 Apr 2014 15:31:05 GMT Full Article headline malware virus cybercrime fraud symantec
ad Symantec Flaws As Bad As It Gets, Claims Google's Project Zero By packetstormsecurity.com Published On :: Thu, 30 Jun 2016 02:19:04 GMT Full Article headline flaw google symantec backdoor
ad Cisco Zero-Day Exploited In The Wild To Crash And Reload Devices By packetstormsecurity.com Published On :: Thu, 01 Nov 2018 14:06:26 GMT Full Article headline hacker denial of service flaw cisco
ad Apple Security Advisory 2019-7-23-1 By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 18:22:22 GMT Apple Security Advisory 2019-7-23-1 - iCloud for Windows 7.13 is now available and addresses code execution and cross site scripting vulnerabilities. Full Article
ad Apple Security Advisory 2019-10-07-4 By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 20:44:48 GMT Apple Security Advisory 2019-10-07-4 - iCloud for Windows 7.14 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities. Full Article
ad Red Hat Security Advisory 2019-1790-01 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:10:26 GMT Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
ad Red Hat Security Advisory 2019-1942-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:17:37 GMT Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
ad Red Hat Security Advisory 2019-2097-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:11:21 GMT Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability. Full Article
ad Red Hat Security Advisory 2019-2400-01 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:08:30 GMT Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
ad Gentoo Linux Security Advisory 201909-01 By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 22:21:33 GMT Gentoo Linux Security Advisory 201909-1 - Multiple vulnerabilities have been found in Perl, the worst of which could result in the arbitrary execution of code. Versions less than 5.28.2 are affected. Full Article
ad Debian Security Advisory 4584-1 By packetstormsecurity.com Published On :: Mon, 16 Dec 2019 15:59:48 GMT Debian Linux Security Advisory 4584-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. Full Article
ad Red Hat Security Advisory 2020-1616-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:22:15 GMT Red Hat Security Advisory 2020-1616-01 - Irssi is a modular IRC client with Perl scripting. Issues addressed include a use-after-free vulnerability. Full Article
ad Amadeus Airline Check-In Bug Exposed Boarding Passes By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 13:53:49 GMT Full Article headline privacy data loss spyware terror
ad Red Hat Security Advisory 2020-1050-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:05:46 GMT Red Hat Security Advisory 2020-1050-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include a cross site request forgery vulnerability. Full Article