vi Turkish Authorities Block Wikipedia Without Giving Reason By packetstormsecurity.com Published On :: Mon, 01 May 2017 15:47:57 GMT Full Article headline government turkey censorship
vi Solaris 11.4 xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 15:03:23 GMT Solaris version 11.4 xscreensaver local privilege escalation exploit. Full Article
vi Solaris xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 23 Oct 2019 20:15:30 GMT This Metasploit module exploits a vulnerability in xscreensaver versions since 5.06 on unpatched Solaris 11 systems which allows users to gain root privileges. xscreensaver allows users to create a user-owned file at any location on the filesystem using the -log command line argument introduced in version 5.06. This module uses xscreensaver to create a log file in /usr/lib/secure/, overwrites the log file with a shared object, and executes the shared object using the LD_PRELOAD environment variable. This module has been tested successfully on xscreensaver version 5.15 on Solaris 11.1 (x86) and xscreensaver version 5.15 on Solaris 11.3 (x86). Full Article
vi SunOS 5.10 Generic_147148-26 Local Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 23:33:33 GMT SunOS version 5.10 Generic_147148-26 local privilege escalation exploit. A buffer overflow in the CheckMonitor() function in the Common Desktop Environment versions 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in a malicious .Xdefaults file. Full Article
vi Common Desktop Environment 2.3.1 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:40:08 GMT A buffer overflow in the CheckMonitor() function in the Common Desktop Environment 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in a malicious .Xdefaults file. Note that Oracle Solaris CDE is based on the original CDE 1.x train, which is different from the CDE 2.x codebase that was later open sourced. Most notably, the vulnerable buffer in the Oracle Solaris CDE is stack-based, while in the open source version it is heap-based. Full Article
vi Common Desktop Environment 1.6 Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:34:40 GMT A buffer overflow in the _SanityCheck() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier allows local users to gain root privileges via a long calendar name or calendar owner passed to sdtcm_convert in a malicious calendar file. The open source version of CDE (based on the CDE 2.x codebase) is not affected, because it does not ship the vulnerable program. Versions 1.6 and below are affected. Full Article
vi Common Desktop Environment 2.3.1 / 1.6 libDtSvc Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:37:07 GMT A difficult to exploit stack-based buffer overflow in the _DtCreateDtDirs() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier may allow local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges via a long X11 display name. The vulnerable function is located in the libDtSvc library and can be reached by executing the setuid program dtsession. Versions 2.3.1 and below as well as 1.6 and earlier are affected. Full Article
vi Android Trojan Switcher Infects Routers Via DNS Hijacking By packetstormsecurity.com Published On :: Fri, 30 Dec 2016 15:26:15 GMT Full Article headline malware phone dns google
vi BIND Comes Apart Thanks To Ancient Denial Of Service Vuln By packetstormsecurity.com Published On :: Wed, 17 Jan 2018 15:02:38 GMT Full Article headline dns denial of service flaw
vi Over 28,000 Web Domains Suspended For Criminal Activity By packetstormsecurity.com Published On :: Fri, 22 Nov 2019 15:38:30 GMT Full Article headline dns cybercrime fraud
vi Debian Security Advisory 4457-1 By packetstormsecurity.com Published On :: Fri, 07 Jun 2019 23:22:22 GMT Debian Linux Security Advisory 4457-1 - Hanno Böck discovered that Evolution was vulnerable to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted HTML email. This issue was mitigated by moving the security bar with encryption and signature information above the message headers. Full Article
vi Debian Security Advisory 4479-1 By packetstormsecurity.com Published On :: Fri, 12 Jul 2019 12:12:44 GMT Debian Linux Security Advisory 4479-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, cross-site scripting, spoofing, information disclosure, denial of service or cross-site request forgery. Full Article
vi Debian Security Advisory 4482-1 By packetstormsecurity.com Published On :: Mon, 15 Jul 2019 15:28:59 GMT Debian Linux Security Advisory 4482-1 - Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code, cross-site scripting, spoofing, information disclosure, denial of service or cross-site request forgery. Full Article
vi Debian Security Advisory 4524-1 By packetstormsecurity.com Published On :: Tue, 17 Sep 2019 16:47:28 GMT Debian Linux Security Advisory 4524-1 - Multiple vulnerabilities have been discovered in the Dino XMPP client, which could allow spoofing message, manipulation of a user's roster (contact list) and unauthorised sending of message carbons. Full Article
vi Apple Security Advisory 2019-9-26-9 By packetstormsecurity.com Published On :: Sun, 29 Sep 2019 17:32:22 GMT Apple Security Advisory 2019-9-26-9 - Safari 13.0.1 addresses user interface spoofing and browser history leakage vulnerabilities. Full Article
vi Windows Defender Antivirus 4.18.1908.7-0 File Extension Spoofing By packetstormsecurity.com Published On :: Thu, 12 Dec 2019 13:42:41 GMT Windows Defender Antivirus version 4.18.1908.7-0 suffers from a file extension spoofing vulnerability. Full Article
vi Apple Security Advisory 2020-1-28-5 By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 17:16:14 GMT Apple Security Advisory 2020-1-28-5 - Safari 13.0.5 is now available and addresses address bar spoofing and password disclosure in transit issues. Full Article
vi Google Invisible RECAPTCHA 3 Spoof Bypass By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 15:23:32 GMT Google Invisible RECAPTCHA version 3 suffers from a spoofing bypass vulnerability. Full Article
vi Red Hat Security Advisory 2020-1080-01 By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 22:22:22 GMT Red Hat Security Advisory 2020-1080-01 - Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Issues addressed include OpenPGP signature spoofing and certificate errors being ignored. Full Article
vi Red Hat Security Advisory 2020-1600-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:24:19 GMT Red Hat Security Advisory 2020-1600-01 - Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications. Issues addressed include a spoofing vulnerability. Full Article
vi Red Hat Security Advisory 2020-1047-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:10:20 GMT Red Hat Security Advisory 2020-1047-01 - The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network. Issues addressed include crash and out of bounds read vulnerabilities. Full Article
vi Red Hat Security Advisory 2020-1084-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:11:25 GMT Red Hat Security Advisory 2020-1084-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information. Full Article
vi Red Hat Security Advisory 2020-1167-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:12:28 GMT Red Hat Security Advisory 2020-1167-01 - Network Block Device is a protocol for accessing hard disks and other disk-like devices over the network. The nbdkit toolkit utilizes NBD to create servers with minimal dependencies. The package contains plug-in support for the C and Python programming languages. Issues addressed include a denial of service vulnerability. Full Article
vi Red Hat Security Advisory 2020-1081-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:12:38 GMT Red Hat Security Advisory 2020-1081-01 - The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol, including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base browser. Issues addressed include denial of service and null pointer vulnerabilities. Full Article
vi Red Hat Security Advisory 2020-1045-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:15:59 GMT Red Hat Security Advisory 2020-1045-01 - LFTP is a file transfer utility for File Transfer Protocol, Secure File Transfer Protocol, Hypertext Transfer Protocol, and other commonly used protocols. It uses the readline library for input, and provides support for bookmarks, built-in monitoring, job control, and parallel transfer of multiple files at the same time. Full Article
vi Gentoo Linux Security Advisory 202004-06 By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 02:51:49 GMT Gentoo Linux Security Advisory 202004-6 - A regression in GnuTLS breaks the security guarantees of the DTLS protocol. Versions less than 3.6.13 are affected. Full Article
vi Red Hat Security Advisory 2020-1318-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:30:11 GMT Red Hat Security Advisory 2020-1318-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. An arbitrary code execution vulnerability was addressed. Full Article
vi Red Hat Security Advisory 2020-1335-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:54:37 GMT Red Hat Security Advisory 2020-1335-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. An arbitrary code execution vulnerability was addressed. Full Article
vi Red Hat Security Advisory 2020-1334-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:58:34 GMT Red Hat Security Advisory 2020-1334-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. An arbitrary code execution vulnerability was addressed. Full Article
vi Red Hat Security Advisory 2020-1342-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:40:28 GMT Red Hat Security Advisory 2020-1342-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. Issues addressed include a code execution vulnerability. Full Article
vi Red Hat Security Advisory 2020-1445-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:39:41 GMT Red Hat Security Advisory 2020-1445-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.4.3 serves as a replacement for Red Hat AMQ Broker 7.4.2, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include cross site scripting, denial of service, and information leakage vulnerabilities. Full Article
vi Red Hat Security Advisory 2020-1470-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 23:09:22 GMT Red Hat Security Advisory 2020-1470-01 - The Network Time Protocol is used to synchronize a computer's time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service. Issues addressed include buffer overflow, code execution, and denial of service vulnerabilities. Full Article
vi Red Hat Security Advisory 2020-1840-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:18:54 GMT Red Hat Security Advisory 2020-1840-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include an information leakage vulnerability. Full Article
vi Red Hat Security Advisory 2020-1878-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:21:10 GMT Red Hat Security Advisory 2020-1878-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information. Full Article
vi Red Hat Security Advisory 2020-1845-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:34:31 GMT Red Hat Security Advisory 2020-1845-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Full Article
vi Red Hat Security Advisory 2020-1998-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 23:46:22 GMT Red Hat Security Advisory 2020-1998-01 - The gnutls packages provide the GNU Transport Layer Security library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. An issue was addressed where the DTLS client hello contains a random value of all zeroes. Full Article
vi Brain Hack Devices Must Be Scrutinized, Say Top Scientists By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:41:11 GMT Full Article headline hacker science
vi U.S. Records Its First Death From Coronavirus By packetstormsecurity.com Published On :: Sun, 01 Mar 2020 15:40:35 GMT Full Article headline government virus china science
vi Pandemic Declared As COVID-19 Blazes Across Globe By packetstormsecurity.com Published On :: Thu, 12 Mar 2020 13:12:47 GMT Full Article headline government virus science
vi Track Coronavirus Updates In Real Time By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:25:04 GMT Full Article headline government virus science
vi Coronavirus Lockdowns: 24 Hours Of Confusion Around The World By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:37:49 GMT Full Article headline government virus science
vi Coronavirus Has Slashed Air Pollution. This Interactive Map Shows How. By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:07:37 GMT Full Article headline virus science
vi How Coronavirus Sentiment And Behavior Has Changed By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:09:43 GMT Full Article headline government science
vi Apple Tracks Changes In Pandemic Travel Behavior By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:06:55 GMT Full Article headline privacy apple science
vi State-Backed Hackers Are Trying To Steal Coronavirus Research By packetstormsecurity.com Published On :: Tue, 05 May 2020 16:03:00 GMT Full Article headline hacker government virus science
vi OpenBSD Patches Auth Bypass, Privilege Escalation Vulns By packetstormsecurity.com Published On :: Thu, 05 Dec 2019 16:54:00 GMT Full Article headline flaw bsd patch
vi Royals Sue Daily Mail Over U.K. Data Protection Act Violation By packetstormsecurity.com Published On :: Thu, 03 Oct 2019 14:13:31 GMT Full Article headline government privacy britain data loss
vi US Negotiates Sharing Electronic Evidence Internationally By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 13:55:14 GMT Full Article headline government privacy usa britain australia
vi Travelex Suspends Services Post Malware Discovery By packetstormsecurity.com Published On :: Fri, 03 Jan 2020 19:15:15 GMT Full Article headline malware britain
vi British Rail Station Wi-Fi Provider Exposed Traveler Data By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:21:04 GMT Full Article headline privacy britain wireless data loss