sec Red Hat Security Advisory 2020-1665-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:30:08 GMT Red Hat Security Advisory 2020-1665-01 - Qt is a software toolkit for developing applications. The qt5-base packages contain base tools for string, xml, and network handling in Qt. Issues addressed include a denial of service vulnerability. Full Article
sec Red Hat Security Advisory 2020-1581-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:30:46 GMT Red Hat Security Advisory 2020-1581-01 - WavPack is a completely open audio compression format providing lossless, high-quality lossy, and a unique hybrid compression mode. Issues addressed include denial of service and out of bounds read vulnerabilities. Full Article
sec Red Hat Security Advisory 2020-1659-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:40:11 GMT Red Hat Security Advisory 2020-1659-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB and OpenTSDB. Issues addressed include a denial of service vulnerability. Full Article
sec (On-Premises Only) Security advisory for Simulation Process Intelligence (3DOrchestrate Services) on 3DEXPERIENCE: March 11th, 2020 By www.3ds.com Published On :: Tue, 10 Mar 2020 11:04:49 +0100 A vulnerability associated with Use of Hard-coded Credentials (CWE-798) exists in Simulation Process Intelligence (3DOrchestrate Services) on premises licensed program. The security risk is evaluated as High (CVSS v.3.0 Base Score 8.0) and affects all 3DEXPERIENCE releases (from 3DEXPERIENCE R2014x to 3DEXPERIENCE R2020x). Full Article 3DEXPERIENCE 3DEXPERIENCE 3DEXPERIENCE R2014x 3DEXPERIENCE R2015x 3DEXPERIENCE R2016x 3DEXPERIENCE R2017x 3DEXPERIENCE R2018x 3DEXPERIENCE R2019x
sec WeWork Unsecured WiFi Exposes Documents By packetstormsecurity.com Published On :: Fri, 20 Sep 2019 14:44:09 GMT Full Article headline privacy wireless data loss
sec comsec By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 17:52:35 GMT -=-=-=-=-=-=-=-=-=-=-=-=-=-= Practical COMSEC Equipment for protecting YOUR privacy. -=-=-=-=-=-=-=-=-=-=-=-=-=-= written by -Q- =============== Full Article
sec SkypeFinds Another Security Snafu By packetstormsecurity.com Published On :: Fri, 01 Feb 2008 11:42:41 GMT Full Article voip
sec Security Hack Allows VoIP Aboard Airlines By packetstormsecurity.com Published On :: Mon, 25 Aug 2008 14:29:24 GMT Full Article voip
sec Chinese Skype Software Secretly Logs Political Chat Messages By packetstormsecurity.com Published On :: Thu, 02 Oct 2008 16:34:11 GMT Full Article government china voip skype
sec Reverse Engineer Extracts Skype Crypto Secret Recipe By packetstormsecurity.com Published On :: Fri, 09 Jul 2010 03:54:59 GMT Full Article voip skype
sec Terrorists Build Secure VoIP Over GPRS Network By packetstormsecurity.com Published On :: Tue, 01 May 2012 21:23:13 GMT Full Article headline phone voip terror
sec Bro Network Security Monitor 2.6.3 By packetstormsecurity.com Published On :: Fri, 09 Aug 2019 20:33:35 GMT Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
sec Bro Network Security Monitor 2.6.4 By packetstormsecurity.com Published On :: Wed, 28 Aug 2019 23:57:22 GMT Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
sec Red Hat Security Advisory 2020-1351-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:41:56 GMT Red Hat Security Advisory 2020-1351-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability. Full Article
sec Red Hat Security Advisory 2020-1378-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:04 GMT Red Hat Security Advisory 2020-1378-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability. Full Article
sec Red Hat Security Advisory 2020-1352-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:20 GMT Red Hat Security Advisory 2020-1352-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Issues addressed include an out of bounds access vulnerability. Full Article
sec Red Hat Security Advisory 2020-1372-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:47 GMT Red Hat Security Advisory 2020-1372-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
sec Red Hat Security Advisory 2020-1358-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:43:19 GMT Red Hat Security Advisory 2020-1358-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Issues addressed include an out of bounds access vulnerability. Full Article
sec Red Hat Security Advisory 2020-1403-01 By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:52:52 GMT Red Hat Security Advisory 2020-1403-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability. Full Article
sec Red Hat Security Advisory 2020-1460-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:40:41 GMT Red Hat Security Advisory 2020-1460-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. BR/EDR encryption key negotiation attacks were addressed. Full Article
sec Red Hat Security Advisory 2020-1473-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 23:02:22 GMT Red Hat Security Advisory 2020-1473-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
sec Red Hat Security Advisory 2020-1465-01 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 00:12:24 GMT Red Hat Security Advisory 2020-1465-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
sec Red Hat Security Advisory 2020-1493-01 By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:34:41 GMT Red Hat Security Advisory 2020-1493-01 - The kernel-alt packages provide the Linux kernel version 4.x. Issues addressed include buffer overflow, denial of service, heap overflow, and null pointer vulnerabilities. Full Article
sec Red Hat Security Advisory 2020-1505-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:53:17 GMT Red Hat Security Advisory 2020-1505-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. An out-of-bounds heap access vulnerability was addressed. Full Article
sec Red Hat Security Advisory 2020-1524-01 By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:10:47 GMT Red Hat Security Advisory 2020-1524-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
sec Red Hat Security Advisory 2020-1769-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:19:01 GMT Red Hat Security Advisory 2020-1769-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, information leakage, integer overflow, null pointer, out of bounds read, and use-after-free vulnerabilities. Full Article
sec Red Hat Security Advisory 2020-1966-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:56:45 GMT Red Hat Security Advisory 2020-1966-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
sec Qualys Security Advisory - OpenBSD Authentication Bypass / Privilege Escalation By packetstormsecurity.com Published On :: Thu, 05 Dec 2019 21:08:17 GMT Qualys has discovered that OpenBSD suffers from multiple authentication bypass and local privilege escalation vulnerabilities. Full Article
sec Qualys Security Advisory - OpenBSD Dynamic Loader Privilege Escalation By packetstormsecurity.com Published On :: Thu, 12 Dec 2019 13:39:44 GMT Qualys discovered a local privilege escalation in OpenBSD's dynamic loader (ld.so). This vulnerability is exploitable in the default installation (via the set-user-ID executable chpass or passwd) and yields full root privileges. They developed a simple proof of concept and successfully tested it against OpenBSD 6.6 (the current release), 6.5, 6.2, and 6.1, on both amd64 and i386; other releases and architectures are probably also exploitable. Full Article
sec Buy Second Hand Furniture To Learn Australian Govt Secrets By packetstormsecurity.com Published On :: Wed, 31 Jan 2018 17:01:23 GMT Full Article headline government privacy australia data loss
sec Security Consultant Granted Bail After Hacking GoGet Systems By packetstormsecurity.com Published On :: Thu, 01 Feb 2018 01:07:35 GMT Full Article headline hacker australia
sec Huawei Rejects Australia Security Concerns By packetstormsecurity.com Published On :: Mon, 18 Jun 2018 16:07:15 GMT Full Article headline government australia china flaw cyberwar backdoor
sec Australia's Cybersecurity Chief Alastair MacGibbon Resigns By packetstormsecurity.com Published On :: Mon, 06 May 2019 13:41:48 GMT Full Article headline government australia
sec Big Brother Tracking Comes To Second Life By packetstormsecurity.com Published On :: Wed, 17 Sep 2008 22:54:23 GMT Full Article rfid
sec Are RFID Chips A Personal Security Risk? By packetstormsecurity.com Published On :: Mon, 29 Sep 2008 13:42:53 GMT Full Article rfid
sec Microsoft Windows SE_SERVER_SECURITY Security Descriptor Owner Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:44:19 GMT In Microsoft Windows, by using the poorly documented SE_SERVER_SECURITY Control flag it is possible to set an owner different to the caller, bypassing security checks. Full Article
sec Second Hacking Crew Joins Syrian Electronic Army On Team Assad By packetstormsecurity.com Published On :: Tue, 02 Sep 2014 06:15:46 GMT Full Article headline hacker government syria
sec Secunia Security Advisory 50313 By packetstormsecurity.com Published On :: Wed, 22 Aug 2012 06:23:11 GMT Secunia Security Advisory - A vulnerability has been reported in CuteSoft Cute Editor for ASP.NET, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
sec UK, Dutch Cops Cuff 5 More In Anonymous-LulzSec Raids By packetstormsecurity.com Published On :: Wed, 20 Jul 2011 14:33:21 GMT Full Article headline britain netherlands anonymous
sec Netherlands Reverts To Hand-Counted Votes To Quell Security Fears By packetstormsecurity.com Published On :: Thu, 02 Feb 2017 13:54:57 GMT Full Article headline government fraud cyberwar netherlands
sec Adobe Fixes Over 100 Vulnerabilities In Latest Security Patch Update By packetstormsecurity.com Published On :: Wed, 11 Jul 2018 15:19:56 GMT Full Article headline flaw adobe patch
sec Microsoft Culls Secret Flash Whitelist After Google Points Out Its Insecurity By packetstormsecurity.com Published On :: Thu, 21 Feb 2019 16:47:46 GMT Full Article headline malware microsoft google adobe
sec Adobe Fixes Critical Security Flaws In Flash, ColdFusion, Campaign By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 15:28:03 GMT Full Article headline adobe patch
sec Adobe Security Patch Update Covers Quite A Bit By packetstormsecurity.com Published On :: Wed, 14 Aug 2019 15:52:56 GMT Full Article headline flaw adobe patch
sec ScanGuard Antivirus Insecure Permissions By packetstormsecurity.com Published On :: Wed, 13 Nov 2019 17:22:05 GMT Scanguard versions through 2019-11-12 on Windows has insecure permissions for the installation directory, leading to privilege escalation via a trojan horse executable file. Full Article
sec What The Checkra1n Jailbreak Means For iDevice Security By packetstormsecurity.com Published On :: Fri, 15 Nov 2019 16:11:22 GMT Full Article headline hacker malware phone flaw apple backdoor
sec IBM And Verizon Take Security To The Cloud By packetstormsecurity.com Published On :: Thu, 01 Apr 2010 09:48:34 GMT Full Article ibm
sec Google Corrects IBM's Security Math By packetstormsecurity.com Published On :: Tue, 31 Aug 2010 01:37:54 GMT Full Article ibm google
sec McAfee, IBM Gobble Rival Security Intelligence Firms By packetstormsecurity.com Published On :: Tue, 04 Oct 2011 15:26:26 GMT Full Article headline ibm mcafee
sec Secret Judge Orders FBI To Reform FISA Process By packetstormsecurity.com Published On :: Wed, 18 Dec 2019 13:57:14 GMT Full Article headline government privacy usa fbi