vi T30-2020 Notification regarding BIOVIA Workbook 2019 SP1 HF3 By www.3ds.com Published On :: Thu, 09 Apr 2020 10:20:28 +0200 BIOVIA Workbook 2019 SP1 Full Article BIOVIA 2019 Tech Notes BIOVIA Content
vi T31-2020 Notification regarding BIOVIA Workbook 2019 HF5 Interim File Release 1 By www.3ds.com Published On :: Wed, 15 Apr 2020 11:54:41 +0200 BIOVIA Workbook 2019 Full Article BIOVIA Tech Notes 2019 BIOVIA Content
vi T32-2020 Notification regarding BIOVIA Workbook 2019 SP1 HF3 Interim File Release 1 By www.3ds.com Published On :: Wed, 15 Apr 2020 11:57:29 +0200 BIOVIA Workbook 2019 Full Article BIOVIA Tech Notes 2019 BIOVIA Content
vi 3DEXPERIENCE, V5 and ENOVIAvpm support on Windows 10, Version1909 By www.3ds.com Published On :: Wed, 29 Apr 2020 09:52:28 +0200 3DEXPERIENCE, V5 and ENOVIAvpm support on Windows 10, Version1909 Full Article 3DEXPERIENCE Hardware and Software Platforms 2020 3DEXPERIENCE 2020x Support Announcements
vi Bluetooth Exploit Can Track And Identify Mobile Device Users By packetstormsecurity.com Published On :: Wed, 17 Jul 2019 13:08:25 GMT Full Article headline privacy wireless spyware
vi Design Flaw Leaves Bluetooth Devices Vulnerable By packetstormsecurity.com Published On :: Sat, 16 Nov 2019 15:35:03 GMT Full Article headline wireless flaw
vi Billions Of Devices Open To Wi-Fi Eavesdropping Attacks By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 07:05:12 GMT Full Article headline wireless flaw
vi Skype Admits Privacy Violation In China By packetstormsecurity.com Published On :: Thu, 02 Oct 2008 09:58:16 GMT Full Article privacy china voip skype
vi Hacker Admits Stealing, Reselling VoIP Services By packetstormsecurity.com Published On :: Thu, 04 Feb 2010 14:15:02 GMT Full Article hacker voip
vi Red Hat Security Advisory 2020-1351-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:41:56 GMT Red Hat Security Advisory 2020-1351-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability. Full Article
vi Red Hat Security Advisory 2020-1378-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:04 GMT Red Hat Security Advisory 2020-1378-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability. Full Article
vi Red Hat Security Advisory 2020-1352-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:20 GMT Red Hat Security Advisory 2020-1352-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Issues addressed include an out of bounds access vulnerability. Full Article
vi Red Hat Security Advisory 2020-1372-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:47 GMT Red Hat Security Advisory 2020-1372-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
vi Red Hat Security Advisory 2020-1358-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:43:19 GMT Red Hat Security Advisory 2020-1358-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Issues addressed include an out of bounds access vulnerability. Full Article
vi Red Hat Security Advisory 2020-1403-01 By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:52:52 GMT Red Hat Security Advisory 2020-1403-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability. Full Article
vi Red Hat Security Advisory 2020-1460-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:40:41 GMT Red Hat Security Advisory 2020-1460-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. BR/EDR encryption key negotiation attacks were addressed. Full Article
vi Red Hat Security Advisory 2020-1473-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 23:02:22 GMT Red Hat Security Advisory 2020-1473-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
vi Red Hat Security Advisory 2020-1465-01 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 00:12:24 GMT Red Hat Security Advisory 2020-1465-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
vi Red Hat Security Advisory 2020-1493-01 By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:34:41 GMT Red Hat Security Advisory 2020-1493-01 - The kernel-alt packages provide the Linux kernel version 4.x. Issues addressed include buffer overflow, denial of service, heap overflow, and null pointer vulnerabilities. Full Article
vi Red Hat Security Advisory 2020-1505-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:53:17 GMT Red Hat Security Advisory 2020-1505-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. An out-of-bounds heap access vulnerability was addressed. Full Article
vi Red Hat Security Advisory 2020-1524-01 By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:10:47 GMT Red Hat Security Advisory 2020-1524-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
vi Red Hat Security Advisory 2020-1769-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:19:01 GMT Red Hat Security Advisory 2020-1769-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, information leakage, integer overflow, null pointer, out of bounds read, and use-after-free vulnerabilities. Full Article
vi Red Hat Security Advisory 2020-1966-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:56:45 GMT Red Hat Security Advisory 2020-1966-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
vi Qualys Security Advisory - OpenBSD Authentication Bypass / Privilege Escalation By packetstormsecurity.com Published On :: Thu, 05 Dec 2019 21:08:17 GMT Qualys has discovered that OpenBSD suffers from multiple authentication bypass and local privilege escalation vulnerabilities. Full Article
vi Qualys Security Advisory - OpenBSD Dynamic Loader Privilege Escalation By packetstormsecurity.com Published On :: Thu, 12 Dec 2019 13:39:44 GMT Qualys discovered a local privilege escalation in OpenBSD's dynamic loader (ld.so). This vulnerability is exploitable in the default installation (via the set-user-ID executable chpass or passwd) and yields full root privileges. They developed a simple proof of concept and successfully tested it against OpenBSD 6.6 (the current release), 6.5, 6.2, and 6.1, on both amd64 and i386; other releases and architectures are probably also exploitable. Full Article
vi OpenBSD Dynamic Loader chpass Privilege Escalation By packetstormsecurity.com Published On :: Fri, 27 Dec 2019 21:27:23 GMT This Metasploit module exploits a vulnerability in the OpenBSD ld.so dynamic loader (CVE-2019-19726). The _dl_getenv() function fails to reset the LD_LIBRARY_PATH environment variable when set with approximately ARG_MAX colons. This can be abused to load libutil.so from an untrusted path, using LD_LIBRARY_PATH in combination with the chpass set-uid executable, resulting in privileged code execution. This module has been tested successfully on OpenBSD 6.1 (amd64) and OpenBSD 6.6 (amd64). Full Article
vi OpenBSD OpenSMTPD Privilege Escalation / Code Execution By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 17:22:34 GMT Qualys discovered a vulnerability in OpenSMTPD, OpenBSD's mail server. This vulnerability is exploitable since May 2018 (commit a8e222352f, "switch smtpd to new grammar") and allows an attacker to execute arbitrary shell commands, as root. Full Article
vi Microsoft Windows WizardOpium Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 06 Mar 2020 13:02:22 GMT Microsoft Windows WizardOpium local privilege escalation exploit. Full Article
vi Deep Instinct Windows Agent 1.2.29.0 Unquoted Service Path By packetstormsecurity.com Published On :: Fri, 06 Mar 2020 15:02:22 GMT Deep Instinct Windows Agent version 1.2.29.0 suffers from an unquoted service path vulnerability. Full Article
vi Microsoft Windows 10 SMB 3.1.1 Local Privilege Escalation By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:38:04 GMT Microsoft Windows 10 SMB version 3.1.1 SMBGhost local privilege escalation exploit. Full Article
vi Microsoft Windows NtFilterToken ParentTokenId Incorrect Setting Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:42:48 GMT Microsoft Windows suffers from an NtFilterToken ParentTokenId incorrect setting that allows for elevation of privileges. Full Article
vi Microsoft Windows SE_SERVER_SECURITY Security Descriptor Owner Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:44:19 GMT In Microsoft Windows, by using the poorly documented SE_SERVER_SECURITY Control flag it is possible to set an owner different to the caller, bypassing security checks. Full Article
vi Microsoft Windows Unquoted Service Path Privilege Escalation By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 20:01:59 GMT This Metasploit module exploits a logic flaw due to how the lpApplicationName parameter is handled. When the lpApplicationName contains a space, the file name is ambiguous. Take this file path as example: C:program fileshello.exe; The Windows API will try to interpret this as two possible paths: C:program.exe, and C:program fileshello.exe, and then execute all of them. To some software developers, this is an unexpected behavior, which becomes a security problem if an attacker is able to place a malicious executable in one of these unexpected paths, sometimes escalate privileges if run as SYSTEM. Some software such as OpenVPN 2.1.1, OpenSSH Server 5, and others have the same problem. Full Article
vi Syrian Electronic Army Claims CNN As Its Latest Victim By packetstormsecurity.com Published On :: Fri, 24 Jan 2014 16:14:29 GMT Full Article headline hacker syria
vi Hacktivists Dish Out DNS Hijack To PayPal, eBay By packetstormsecurity.com Published On :: Tue, 04 Feb 2014 00:00:19 GMT Full Article headline hacker dns ebay syria
vi SEA Screws With Facebook's WHOIS Via Mark Monitor By packetstormsecurity.com Published On :: Thu, 06 Feb 2014 16:07:44 GMT Full Article headline hacker dns facebook syria
vi Taboola Hack Allows SEA To Redirect Reuters Site Visitors By packetstormsecurity.com Published On :: Tue, 24 Jun 2014 01:30:40 GMT Full Article headline hacker flaw syria
vi Anonymous Becomes Peacemaker As Hacktivists Battle By packetstormsecurity.com Published On :: Tue, 05 Mar 2013 06:52:36 GMT Full Article headline anonymous malaysia philippines
vi Tinc Virtual Private Network Daemon 1.0.36 By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 16:04:57 GMT tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information. Full Article
vi Secunia Security Advisory 50313 By packetstormsecurity.com Published On :: Wed, 22 Aug 2012 06:23:11 GMT Secunia Security Advisory - A vulnerability has been reported in CuteSoft Cute Editor for ASP.NET, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
vi Numara / BMC Track-It! FileStorageService Arbitrary File Upload By packetstormsecurity.com Published On :: Tue, 21 Oct 2014 02:43:59 GMT This Metasploit module exploits an arbitrary file upload vulnerability in Numara / BMC Track-It! v8 to v11.X. The application exposes the FileStorageService .NET remoting service on port 9010 (9004 for version 8) which accepts unauthenticated uploads. This can be abused by a malicious user to upload a ASP or ASPX file to the web root leading to arbitrary code execution as NETWORK SERVICE or SYSTEM. This Metasploit module has been tested successfully on versions 11.3.0.355, 10.0.51.135, 10.0.50.107, 10.0.0.143, 9.0.30.248 and 8.0.2.51. Full Article
vi ASP.NET jVideo Kit 1.0 SQL Injection By packetstormsecurity.com Published On :: Thu, 24 May 2018 18:08:18 GMT ASP.NET jVideo Kit version 1.0 suffers from a remote SQL injection vulnerability. Full Article
vi Egyptian Government Caught Tracking Opponents And Activists By packetstormsecurity.com Published On :: Fri, 04 Oct 2019 13:47:48 GMT Full Article headline government privacy phone spyware egypt
vi Magecart Gang Attacks Olympic Ticket Reseller And Survival Food Sites By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 14:12:43 GMT Full Article headline malware bank cybercrime fraud
vi New Mirai Botnet Variant Targets NAS Devices By packetstormsecurity.com Published On :: Fri, 20 Mar 2020 15:11:55 GMT Full Article headline malware botnet
vi Microsoft Taps Eric Holder To Audit AnyVision Face Recognition By packetstormsecurity.com Published On :: Sat, 16 Nov 2019 15:35:09 GMT Full Article headline microsoft fraud
vi Microsoft Fixes Exploited Privilege Escalation Flaw, 34 More Bugs By packetstormsecurity.com Published On :: Wed, 11 Dec 2019 16:44:06 GMT Full Article headline microsoft flaw patch
vi TOR Virtual Network Tunneling Tool 0.4.0.5 By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 10:11:11 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
vi TOR Virtual Network Tunneling Tool 0.4.1.5 By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:34:13 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
vi TOR Virtual Network Tunneling Tool 0.4.1.6 By packetstormsecurity.com Published On :: Thu, 19 Sep 2019 16:34:13 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article