vi North Korean APT Uses Chrome Extension To Infect Victims By packetstormsecurity.com Published On :: Wed, 05 Dec 2018 15:45:34 GMT Full Article headline hacker government malware cyberwar google korea chrome
vi Chrome In Android Leaks Device Fingerprinting Info By packetstormsecurity.com Published On :: Thu, 03 Jan 2019 15:12:09 GMT Full Article headline privacy phone flaw google chrome
vi Dovecot 2.3 Denial Of Service By packetstormsecurity.com Published On :: Thu, 02 May 2019 01:17:04 GMT Dovecot version 2.3 suffers from multiple denial of service conditions. Included in this archive is the advisory as well as patches to address the issue. Full Article
vi Failed Twice, Revived Again: CISPA Returns By packetstormsecurity.com Published On :: Thu, 01 May 2014 15:10:18 GMT Full Article headline government privacy usa mpaa censorship
vi China Blocks Google Services To Silence Tiananmen Critics By packetstormsecurity.com Published On :: Mon, 02 Jun 2014 13:33:58 GMT Full Article headline government china google censorship
vi China To Crack Down On Censor-Busting Services By packetstormsecurity.com Published On :: Mon, 23 Jan 2017 16:16:08 GMT Full Article headline government china censorship
vi Zoom: Every Security Issue Uncovered In The Video Chat App By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 14:32:56 GMT Full Article headline hacker privacy phone flaw cryptography
vi Tor Project Loses A Third Of Staff In Coronavirus Cuts By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:31 GMT Full Article headline privacy virus cryptography
vi devicelock.zip By packetstormsecurity.com Published On :: Tue, 31 Oct 2000 00:10:44 GMT Devicelock gives network administrators control over which users can access what removable devices (floppies, Magneto-Optical disks, CD-ROMs, ZIPs, etc.) on a local computer. It can protect network and local computers against viruses, trojans and other malicious programs often injected from removable disks. This version is for Windows 2000/NT. Windows ME version available here. Full Article
vi Gentoo Linux Security Advisory 202004-14 By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:52:20 GMT Gentoo Linux Security Advisory 202004-14 - Multiple vulnerabilities have been found in FontForge, the worst of which could result in the arbitrary execution of code. Versions less than 20200314 are affected. Full Article
vi Gentoo Linux Security Advisory 202004-15 By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:52:27 GMT Gentoo Linux Security Advisory 202004-15 - Multiple vulnerabilities have been found in libu2f-host, the worst of which could result in the execution of code. Versions less than 1.1.10 are affected. Full Article
vi Gentoo Linux Security Advisory 202004-16 By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:52:33 GMT Gentoo Linux Security Advisory 202004-16 - Multiple vulnerabilities have been found in Cacti, the worst of which could result in the arbitrary execution of code. Versions less than 1.2.11 are affected. Full Article
vi Gentoo Linux Security Advisory 202004-17 By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:52:38 GMT Gentoo Linux Security Advisory 202004-17 - Multiple vulnerabilities have been found in Django, the worst of which could result in privilege escalation. Versions less than 2.2.11 are affected. Full Article
vi SolarWinds MSP PME Cache Service Insecure File Permissions / Code Execution By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:17:54 GMT SolarWinds MSP PME Cache Service versions prior to 1.1.15 suffer from insecure file permission and code execution vulnerabilities. Full Article
vi Pwn2Own Contest Yields 13 Bugs, As Virtual Format Expands Talent Pool By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:38 GMT Full Article headline hacker canada conference
vi Debian Security Advisory 4481-1 By packetstormsecurity.com Published On :: Sat, 13 Jul 2019 18:22:22 GMT Debian Linux Security Advisory 4481-1 - Harsh Jaiswal discovered a remote shell execution vulnerability in ruby-mini-magick, a Ruby library providing a wrapper around ImageMagick or GraphicsMagick, exploitable when using MiniMagick::Image.open with specially crafted URLs coming from unsanitized user input. Full Article
vi Red Hat Security Advisory 2019-1833-01 By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 14:44:44 GMT Red Hat Security Advisory 2019-1833-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. This update fixes various bugs and adds enhancements. Full Article
vi Red Hat Security Advisory 2019-1948-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:14:13 GMT Red Hat Security Advisory 2019-1948-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. A name equality check issue was addressed. Full Article
vi Red Hat Security Advisory 2019-1972-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:55:42 GMT Red Hat Security Advisory 2019-1972-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include a code execution vulnerability. Full Article
vi Red Hat Security Advisory 2019-2028-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 20:58:01 GMT Red Hat Security Advisory 2019-2028-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and traversal vulnerabilities. Full Article
vi Red Hat Security Advisory 2019-2466-01 By packetstormsecurity.com Published On :: Tue, 13 Aug 2019 14:33:46 GMT Red Hat Security Advisory 2019-2466-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. An improper authorization issue was addressed. Full Article
vi Red Hat Security Advisory 2019-2565-01 By packetstormsecurity.com Published On :: Tue, 27 Aug 2019 13:30:34 GMT Red Hat Security Advisory 2019-2565-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. An OpenSSL issue was addressed where an X509 name equality check did not work correctly. Full Article
vi Red Hat Security Advisory 2019-2587-01 By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 14:07:44 GMT Red Hat Security Advisory 2019-2587-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. Issues addressed include code execution and denial of service vulnerabilities. Full Article
vi Red Hat Security Advisory 2019-2806-01 By packetstormsecurity.com Published On :: Thu, 19 Sep 2019 16:27:44 GMT Red Hat Security Advisory 2019-2806-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include a code execution vulnerability. Full Article
vi Red Hat Security Advisory 2019-4201-01 By packetstormsecurity.com Published On :: Fri, 13 Dec 2019 01:28:02 GMT Red Hat Security Advisory 2019-4201-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. Issues addressed include a denial of service vulnerability. Full Article
vi Debian Security Advisory 4587-1 By packetstormsecurity.com Published On :: Tue, 17 Dec 2019 15:42:32 GMT Debian Linux Security Advisory 4587-1 - Several vulnerabilities have been discovered in the interpreter for the Ruby language, which could result in unauthorized access by bypassing intended path matchings, denial of service, or the execution of arbitrary code. Full Article
vi Debian Security Advisory 4586-1 By packetstormsecurity.com Published On :: Tue, 17 Dec 2019 15:42:38 GMT Debian Linux Security Advisory 4586-1 - Several vulnerabilities have been discovered in the interpreter for the Ruby language, which could result in unauthorized access by bypassing intended path matchings, denial of service, or the execution of arbitrary code. Full Article
vi Red Hat Security Advisory 2020-0542-01 By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 15:07:18 GMT Red Hat Security Advisory 2020-0542-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and traversal vulnerabilities. Full Article
vi Red Hat Security Advisory 2020-0588-01 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:17:25 GMT Red Hat Security Advisory 2020-0588-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. A remote code execution vulnerability has been addressed. Full Article
vi Red Hat Security Advisory 2020-0589-01 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:18:00 GMT Red Hat Security Advisory 2020-0589-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. A remote code execution vulnerability has been addressed. Full Article
vi Red Hat Security Advisory 2020-0591-01 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:23:22 GMT Red Hat Security Advisory 2020-0591-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and traversal vulnerabilities. Full Article
vi Red Hat Security Advisory 2020-0663-01 By packetstormsecurity.com Published On :: Tue, 03 Mar 2020 16:33:42 GMT Red Hat Security Advisory 2020-0663-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and traversal vulnerabilities. Full Article
vi Gentoo Linux Security Advisory 202003-06 By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:58:36 GMT Gentoo Linux Security Advisory 202003-6 - Multiple vulnerabilities have been found in Ruby, the worst of which could lead to the remote execution of arbitrary code. Versions less than 2.4.9:2.4 are affected. Full Article
vi Gentoo Linux Security Advisory 202003-09 By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:08:19 GMT Gentoo Linux Security Advisory 202003-9 - A vulnerability in OpenID library for Ruby at worst might allow an attacker to bypass authentication. Versions less than 2.9.2 are affected. Full Article
vi Twitter Bot Activity Spiked After The Release Of The Mueller Report By packetstormsecurity.com Published On :: Sun, 21 Apr 2019 15:49:57 GMT Full Article headline government usa russia fraud cyberwar twitter fbi
vi US To Demand Five Years Of Your Social Media, Email Account Info In Your Visa Application By packetstormsecurity.com Published On :: Mon, 03 Jun 2019 14:09:54 GMT Full Article headline government privacy usa facebook social twitter terror
vi Social Media Giants Warn Of AI Moderation Errors As Coronavirus Empties Offices By packetstormsecurity.com Published On :: Tue, 17 Mar 2020 13:06:52 GMT Full Article headline virus google facebook twitter
vi Secunia Security Advisory 30197 By packetstormsecurity.com Published On :: Mon, 12 May 2008 22:24:40 GMT Secunia Security Advisory - Some vulnerabilities have been reported in Microsoft Windows CE, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Article
vi Microsoft PowerPoint Viewer TextBytesAtom Stack Buffer Overflow By packetstormsecurity.com Published On :: Fri, 14 May 2010 14:44:02 GMT This Metasploit module exploits a stack buffer overflow vulnerability in the handling of the TextBytesAtom records by Microsoft PowerPoint Viewer. According to Microsoft, the PowerPoint Viewer distributed with Office 2003 SP3 and earlier, as well as Office 2004 for Mac, are vulnerable. NOTE: The vulnerable code path is not reachable on versions of Windows prior to Windows Vista. Full Article
vi Windows Vista/7 lpksetup.exe DLL Hijacking By packetstormsecurity.com Published On :: Wed, 27 Oct 2010 01:49:35 GMT Microsoft Windows Vista/7 suffers from a DLL hijacking vulnerability in lpksetup.exe. Full Article
vi Windows Vista/7 UAC Bypass Exploit By packetstormsecurity.com Published On :: Wed, 24 Nov 2010 22:52:18 GMT Microsoft Windows Vista / 7 privilege escalation exploit that has UAC bypass. Full Article
vi Microsoft Windows Vista/Server 2008 nsiproxy.sys Denial Of Service By packetstormsecurity.com Published On :: Wed, 18 May 2011 09:09:09 GMT Microsoft Windows Vista/Server 2008 nsiproxy.sys local kernel denial of service exploit. Full Article
vi Mandriva Linux Security Advisory 2012-081 By packetstormsecurity.com Published On :: Thu, 24 May 2012 15:20:53 GMT Mandriva Linux Security Advisory 2012-081 - Security issues were identified and fixed in mozilla firefox. Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Using the Address Sanitizer tool, security researcher Aki Helin from OUSPG found that IDBKeyRange of indexedDB remains in the XPConnect hashtable instead of being unlinked before being destroyed. Security research firm iDefense reported that researcher wushi of team509 discovered a memory corruption on Windows Vista and Windows 7 systems with hardware acceleration disabled or using incompatible video drivers. Various other issues have also been addressed. Full Article
vi MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation By packetstormsecurity.com Published On :: Mon, 29 Jul 2013 22:14:06 GMT The Windows kernel does not properly isolate broadcast messages from low integrity applications from medium or high integrity applications. This allows commands to be broadcasted to an open medium or high integrity command prompts allowing escalation of privileges. We can spawn a medium integrity command prompt, after spawning a low integrity command prompt, by using the Win+Shift+# combination to specify the position of the command prompt on the taskbar. We can then broadcast our command and hope that the user is away and doesn't corrupt it by interacting with the UI. Broadcast issue affects versions Windows Vista, 7, 8, Server 2008, Server 2008 R2, Server 2012, RT. But Spawning a command prompt with the shortcut key does not work in Vista so you will have to check if the user is already running a command prompt and set SPAWN_PROMPT false. The WEB technique will execute a powershell encoded payload from a Web location. The FILE technique will drop an executable to the file system, set it to medium integrity and execute it. The TYPE technique will attempt to execute a powershell encoded payload directly from the command line but it may take some time to complete. Full Article
vi HP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:19:31 GMT This Metasploit module exploits a vulnerability on the lrFileIOService ActiveX, as installed with HP LoadRunner 11.50. The vulnerability exists in the WriteFileString method, which allow the user to write arbitrary files. It's abused to drop a payload embedded in a dll, which is later loaded through the Init() method from the lrMdrvService control, by abusing an insecure LoadLibrary call. This Metasploit module has been tested successfully on IE8 on Windows XP. Virtualization based on the Low Integrity Process, on Windows Vista and 7, will stop this module because the DLL will be dropped to a virtualized folder, which isn't used by LoadLibrary. Full Article
vi SolidWorks Workgroup PDM 2014 pdmwService.exe Arbitrary File Write By packetstormsecurity.com Published On :: Thu, 06 Mar 2014 03:15:49 GMT This Metasploit module exploits a remote arbitrary file write vulnerability in SolidWorks Workgroup PDM 2014 SP2 and prior. For targets running Windows Vista or newer the payload is written to the startup folder for all users and executed upon next user logon. For targets before Windows Vista code execution can be achieved by first uploading the payload as an exe file, and then upload another mof file, which schedules WMI to execute the uploaded payload. This Metasploit module has been tested successfully on SolidWorks Workgroup PDM 2011 SP0 on Windows XP SP3 (EN) and Windows 7 SP1 (EN). Full Article
vi Coronavirus: Health Leaders Credentials Dumped Online By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:05:03 GMT Full Article headline hacker government privacy virus data loss password
vi Small Businesses Tapping COVID-19 Loans Hit With Data Exposure By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:05:07 GMT Full Article headline government privacy usa virus data loss
vi Google Android RCE Bug Allows Attacker Full Device Access By packetstormsecurity.com Published On :: Tue, 05 May 2020 16:03:04 GMT Full Article headline privacy phone data loss flaw google
vi Search Provider Algolia Discloses Security Incident By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:31:10 GMT Full Article headline hacker privacy data loss flaw