vis Red Hat Security Advisory 2020-1465-01 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 00:12:24 GMT Red Hat Security Advisory 2020-1465-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
vis Red Hat Security Advisory 2020-1493-01 By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:34:41 GMT Red Hat Security Advisory 2020-1493-01 - The kernel-alt packages provide the Linux kernel version 4.x. Issues addressed include buffer overflow, denial of service, heap overflow, and null pointer vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-1505-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:53:17 GMT Red Hat Security Advisory 2020-1505-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. An out-of-bounds heap access vulnerability was addressed. Full Article
vis Red Hat Security Advisory 2020-1524-01 By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:10:47 GMT Red Hat Security Advisory 2020-1524-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
vis Red Hat Security Advisory 2020-1769-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:19:01 GMT Red Hat Security Advisory 2020-1769-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, information leakage, integer overflow, null pointer, out of bounds read, and use-after-free vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-1966-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:56:45 GMT Red Hat Security Advisory 2020-1966-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
vis Qualys Security Advisory - OpenBSD Authentication Bypass / Privilege Escalation By packetstormsecurity.com Published On :: Thu, 05 Dec 2019 21:08:17 GMT Qualys has discovered that OpenBSD suffers from multiple authentication bypass and local privilege escalation vulnerabilities. Full Article
vis Qualys Security Advisory - OpenBSD Dynamic Loader Privilege Escalation By packetstormsecurity.com Published On :: Thu, 12 Dec 2019 13:39:44 GMT Qualys discovered a local privilege escalation in OpenBSD's dynamic loader (ld.so). This vulnerability is exploitable in the default installation (via the set-user-ID executable chpass or passwd) and yields full root privileges. They developed a simple proof of concept and successfully tested it against OpenBSD 6.6 (the current release), 6.5, 6.2, and 6.1, on both amd64 and i386; other releases and architectures are probably also exploitable. Full Article
vis Hacktivists Dish Out DNS Hijack To PayPal, eBay By packetstormsecurity.com Published On :: Tue, 04 Feb 2014 00:00:19 GMT Full Article headline hacker dns ebay syria
vis Taboola Hack Allows SEA To Redirect Reuters Site Visitors By packetstormsecurity.com Published On :: Tue, 24 Jun 2014 01:30:40 GMT Full Article headline hacker flaw syria
vis Anonymous Becomes Peacemaker As Hacktivists Battle By packetstormsecurity.com Published On :: Tue, 05 Mar 2013 06:52:36 GMT Full Article headline anonymous malaysia philippines
vis Secunia Security Advisory 50313 By packetstormsecurity.com Published On :: Wed, 22 Aug 2012 06:23:11 GMT Secunia Security Advisory - A vulnerability has been reported in CuteSoft Cute Editor for ASP.NET, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
vis Egyptian Government Caught Tracking Opponents And Activists By packetstormsecurity.com Published On :: Fri, 04 Oct 2019 13:47:48 GMT Full Article headline government privacy phone spyware egypt
vis Microsoft Taps Eric Holder To Audit AnyVision Face Recognition By packetstormsecurity.com Published On :: Sat, 16 Nov 2019 15:35:09 GMT Full Article headline microsoft fraud
vis Magecart Gang Targets Skin Care Site Visitors For 5+ Months By packetstormsecurity.com Published On :: Mon, 28 Oct 2019 16:58:09 GMT Full Article headline cybercrime fraud backdoor
vis Secunia Security Advisory 29803 By packetstormsecurity.com Published On :: Tue, 15 Apr 2008 17:23:16 GMT Secunia Security Advisory - A vulnerability has been reported in MirBSD Korn Shell, which can be exploited by malicious, local users to gain escalated privileges. Full Article
vis Adi Shamir Couldn't Get US Visa To Attend RSA Conference Named For Him By packetstormsecurity.com Published On :: Wed, 06 Mar 2019 15:36:10 GMT Full Article headline government usa conference cryptography rsa
vis FreeBSD Security Advisory - ntp Authentication Bypass By packetstormsecurity.com Published On :: Mon, 26 Oct 2015 19:32:22 GMT FreeBSD Security Advisory - Crypto-NAK packets can be used to cause ntpd(8) to accept time from an unauthenticated ephemeral symmetric peer by bypassing the authentication required to mobilize peer associations. FreeBSD 9.3 and 10.1 are not affected. Various other issues have also been addressed. Full Article
vis Debian Security Advisory 3417-1 By packetstormsecurity.com Published On :: Mon, 14 Dec 2015 16:40:50 GMT Debian Linux Security Advisory 3417-1 - Tibor Jager, Jorg Schwenk, and Juraj Somorovsky, from Horst Gortz Institute for IT Security, published a paper in ESORICS 2015 where they describe an invalid curve attack in Bouncy Castle Crypto, a Java library for cryptography. An attacker is able to recover private Elliptic Curve keys from different applications, for example, TLS servers. Full Article
vis Debian Security Advisory 3457-1 By packetstormsecurity.com Published On :: Thu, 28 Jan 2016 17:19:51 GMT Debian Linux Security Advisory 3457-1 - Multiple security issues have been found in Iceweasel, Debian's version buffer overflow may lead to the execution of arbitrary code. In addition the bundled NSS crypto library addresses the SLOTH attack on TLS 1.2. Full Article
vis Apple Security Advisory 2016-03-21-7 By packetstormsecurity.com Published On :: Tue, 22 Mar 2016 15:23:11 GMT Apple Security Advisory 2016-03-21-7 - OS X Server 5.1 is now available and addresses RC4 crypto weaknesses, file access, and information disclosure vulnerabilities. Full Article
vis Debian Security Advisory 3967-1 By packetstormsecurity.com Published On :: Fri, 08 Sep 2017 13:34:00 GMT Debian Linux Security Advisory 3967-1 - An authentication bypass vulnerability was discovered in mbed TLS, a lightweight crypto and SSL/TLS library, when the authentication mode is configured as 'optional'. A remote attacker can take advantage of this flaw to mount a man-in-the-middle attack and impersonate an intended peer via an X.509 certificate chain with many intermediates. Full Article
vis Debian Security Advisory 4138-1 By packetstormsecurity.com Published On :: Thu, 15 Mar 2018 15:57:24 GMT Debian Linux Security Advisory 4138-1 - Several vulnerabilities were discovered in mbed TLS, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code. Full Article
vis Debian Security Advisory 4147-1 By packetstormsecurity.com Published On :: Thu, 22 Mar 2018 22:23:00 GMT Debian Linux Security Advisory 4147-1 - Several vulnerabilities were discovered in PolarSSL, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code. Full Article
vis Debian Security Advisory 4296-1 By packetstormsecurity.com Published On :: Tue, 18 Sep 2018 02:18:40 GMT Debian Linux Security Advisory 4296-1 - Two vulnerabilities were discovered in mbedtls, a lightweight crypto and SSL/TLS library which could result in plain text recovery via side-channel attacks. Full Article
vis Red Hat Security Advisory 2020-1975-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:37 GMT Red Hat Security Advisory 2020-1975-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
vis Red Hat Security Advisory 2020-1979-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:52 GMT Red Hat Security Advisory 2020-1979-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
vis Red Hat Security Advisory 2020-1978-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:05 GMT Red Hat Security Advisory 2020-1978-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
vis Red Hat Security Advisory 2020-1980-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:13 GMT Red Hat Security Advisory 2020-1980-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
vis Red Hat Security Advisory 2020-1422-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:30 GMT Red Hat Security Advisory 2020-1422-01 - This release of Red Hat build of Eclipse Vert.x 3.9.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Full Article
vis Apple Security Advisory 2019-7-23-1 By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 18:22:22 GMT Apple Security Advisory 2019-7-23-1 - iCloud for Windows 7.13 is now available and addresses code execution and cross site scripting vulnerabilities. Full Article
vis Apple Security Advisory 2019-10-07-4 By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 20:44:48 GMT Apple Security Advisory 2019-10-07-4 - iCloud for Windows 7.14 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities. Full Article
vis Red Hat Security Advisory 2019-1790-01 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:10:26 GMT Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
vis Red Hat Security Advisory 2019-1942-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:17:37 GMT Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
vis Red Hat Security Advisory 2019-2097-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:11:21 GMT Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability. Full Article
vis Red Hat Security Advisory 2019-2400-01 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:08:30 GMT Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
vis Gentoo Linux Security Advisory 201909-01 By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 22:21:33 GMT Gentoo Linux Security Advisory 201909-1 - Multiple vulnerabilities have been found in Perl, the worst of which could result in the arbitrary execution of code. Versions less than 5.28.2 are affected. Full Article
vis Debian Security Advisory 4584-1 By packetstormsecurity.com Published On :: Mon, 16 Dec 2019 15:59:48 GMT Debian Linux Security Advisory 4584-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. Full Article
vis Red Hat Security Advisory 2020-1616-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:22:15 GMT Red Hat Security Advisory 2020-1616-01 - Irssi is a modular IRC client with Perl scripting. Issues addressed include a use-after-free vulnerability. Full Article
vis Red Hat Security Advisory 2020-1050-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:05:46 GMT Red Hat Security Advisory 2020-1050-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include a cross site request forgery vulnerability. Full Article
vis COVID-19 Visited The RSA Conference This Year By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 13:51:23 GMT Full Article headline virus conference rsa
vis Gentoo Linux Security Advisory 202003-38 By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 21:59:56 GMT Gentoo Linux Security Advisory 202003-38 - A vulnerability in Imagick PHP extension might allow an attacker to execute arbitrary code. Versions less than 3.4.4 are affected. Full Article
vis Red Hat Security Advisory 2020-1112-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 14:58:12 GMT Red Hat Security Advisory 2020-1112-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Issues addressed include a cross site scripting vulnerability. Full Article
vis FreeBSD Security Advisory - FreeBSD-SA-19:08.rack By packetstormsecurity.com Published On :: Fri, 21 Jun 2019 18:32:22 GMT FreeBSD Security Advisory - While processing acknowledgements, the RACK code uses several linked lists to maintain state entries. A malicious attacker can cause the lists to grow unbounded. This can cause an expensive list traversal on every packet being processed, leading to resource exhaustion and a denial of service. An attacker with the ability to send specially crafted TCP traffic to a victim system can degrade network performance and/or consume excessive CPU by exploiting the inefficiency of traversing the potentially very large RACK linked lists with relatively small bandwidth cost. Full Article
vis FreeBSD Security Advisory - FreeBSD-SA-19:09.iconv By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 18:20:31 GMT FreeBSD Security Advisory - With certain inputs, iconv may write beyond the end of the output buffer. Depending on the way in which iconv is used, an attacker may be able to create a denial of service, provoke incorrect program behavior, or induce a remote code execution. iconv is a libc library function and the nature of possible attacks will depend on the way in which iconv is used by applications or daemons. Full Article
vis FreeBSD Security Advisory - FreeBSD-SA-19:11.cd_ioctl By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 18:23:20 GMT FreeBSD Security Advisory - To implement one particular ioctl, the Linux emulation code used a special interface present in the cd(4) driver which allows it to copy subchannel information directly to a kernel address. This interface was erroneously made accessible to userland, allowing users with read access to a cd(4) device to arbitrarily overwrite kernel memory when some media is present in the device. A user in the operator group can make use of this interface to gain root privileges on a system with a cd(4) device when some media is present in the device. Full Article
vis FreeBSD Security Advisory - FreeBSD-SA-19:10.ufs By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 18:23:53 GMT FreeBSD Security Advisory - A bug causes up to three bytes of kernel stack memory to be written to disk as uninitialized directory entry padding. This data can be viewed by any user with read access to the directory. Additionally, a malicious user with write access to a directory can cause up to 254 bytes of kernel stack memory to be exposed. Some amount of the kernel stack is disclosed and written out to the filesystem. Full Article
vis FreeBSD Security Advisory - FreeBSD-SA-19:12.telnet By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 14:02:22 GMT FreeBSD Security Advisory - Insufficient validation of environment variables in the telnet client supplied in FreeBSD can lead to stack-based buffer overflows. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client. Inbound telnet sessions to telnetd(8) are not affected by this issue. These buffer overflows may be triggered when connecting to a malicious server, or by an active attacker in the network path between the client and server. Specially crafted TELNET command sequences may cause the execution of arbitrary code with the privileges of the user invoking telnet(1). Full Article
vis FreeBSD Security Advisory - FreeBSD-SA-19:14.freebsd32 By packetstormsecurity.com Published On :: Thu, 25 Jul 2019 11:11:11 GMT FreeBSD Security Advisory - Due to insufficient initialization of memory copied to userland in the components listed above small amounts of kernel memory may be disclosed to userland processes. A user who can invoke 32-bit FreeBSD ioctls may be able to read the contents of small portions of kernel memory. Such memory might contain sensitive information, such as portions of the file cache or terminal buffers. This information might be directly useful, or it might be leveraged to obtain elevated privileges in some way; for example, a terminal buffer might include a user-entered password. Full Article
vis FreeBSD Security Advisory - FreeBSD-SA-19:15.mqueuefs By packetstormsecurity.com Published On :: Thu, 25 Jul 2019 14:02:22 GMT FreeBSD Security Advisory - System calls operating on file descriptors obtain a reference to relevant struct file which due to a programming error was not always put back, which in turn could be used to overflow the counter of affected struct file. A local user can use this flaw to obtain access to files, directories, sockets etc. opened by processes owned by other users. If obtained struct file represents a directory from outside of user's jail, it can be used to access files outside of the jail. If the user in question is a jailed root they can obtain root privileges on the host system. Full Article