y Secunia Security Advisory 52149 By packetstormsecurity.com Published On :: Wed, 13 Feb 2013 11:12:37 GMT Secunia Security Advisory - SUSE has issued an update for ruby on rails. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks and to compromise a vulnerable system. Full Article
y Mandriva Linux Security Advisory 2015-046 By packetstormsecurity.com Published On :: Thu, 12 Feb 2015 16:45:56 GMT Mandriva Linux Security Advisory 2015-046 - Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. Full Article
y Mandriva Linux Security Advisory 2015-140 By packetstormsecurity.com Published On :: Mon, 30 Mar 2015 21:48:37 GMT Mandriva Linux Security Advisory 2015-140 - If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. A remote unauthenticated attacker may craft special packets that trigger buffer overflows in the ntpd functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure(). The resulting buffer overflows may be exploited to allow arbitrary malicious code to be executed with the privilege of the ntpd process. A section of code in ntpd handling a rare error is missing a return statement, therefore processing did not stop when the error was encountered. This situation may be exploitable by an attacker. Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. The ntp package has been patched to fix these issues. Full Article
y Jury Scrutinizes DMCA in ElcomSoft Case By packetstormsecurity.com Published On :: Mon, 16 Dec 2002 04:01:13 GMT Full Article government dmca
y DMCA Strikes Again - First Amendment Does Not Apply By packetstormsecurity.com Published On :: Thu, 10 Apr 2003 04:35:11 GMT Full Article dmca
y Security Research Exception To DMCA Considered By packetstormsecurity.com Published On :: Tue, 13 May 2003 07:52:12 GMT Full Article dmca
y Jury Convicts DirecTV Pirate On DMCA Charges By packetstormsecurity.com Published On :: Tue, 23 Sep 2003 14:42:48 GMT Full Article government dmca
y WTF! It Should Not Be Illegal To Hack Your Own Car's Computer By packetstormsecurity.com Published On :: Fri, 23 Jan 2015 15:33:39 GMT Full Article headline hacker government usa dmca
y IOActive Gagged By DMCA On Eve Of Wireless Key Vuln Reveal By packetstormsecurity.com Published On :: Wed, 06 May 2015 13:47:37 GMT Full Article headline wireless flaw dmca
y Libya's Internet Goes Dark As Upheaval Spreads By packetstormsecurity.com Published On :: Sat, 05 Mar 2011 01:54:34 GMT Full Article headline government libya
y Libyans Will Fight No-Fly Zone By packetstormsecurity.com Published On :: Wed, 09 Mar 2011 15:22:38 GMT Full Article headline government libya
y Secret Libya Psyops, Caught By Online Sleuths By packetstormsecurity.com Published On :: Mon, 21 Mar 2011 15:27:04 GMT Full Article headline government usa libya
y The Robot War Over Libya Has Begun By packetstormsecurity.com Published On :: Fri, 22 Apr 2011 00:37:03 GMT Full Article headline libya
y Rebel Hackers Seize Libyan Domain Name Registry By packetstormsecurity.com Published On :: Mon, 22 Aug 2011 14:05:57 GMT Full Article headline hacker libya
y Libyan Rebels Are Flying Their Own Minidrone By packetstormsecurity.com Published On :: Wed, 24 Aug 2011 02:20:49 GMT Full Article headline libya
y Satellite Photos Take You Inside Gadhafi's Compound By packetstormsecurity.com Published On :: Sat, 27 Aug 2011 14:03:12 GMT Full Article headline libya
y US Military Debated Hacking Libyan Air Defenses By packetstormsecurity.com Published On :: Mon, 17 Oct 2011 22:46:50 GMT Full Article headline government usa cyberwar libya
y Gaddafi Death Reports Likely To Spawn Multiple Scams By packetstormsecurity.com Published On :: Thu, 20 Oct 2011 23:22:09 GMT Full Article headline scam libya
y Libya's New Rulers Fire Up Gaddafi's Surveillance Tech By packetstormsecurity.com Published On :: Fri, 06 Jul 2012 13:55:09 GMT Full Article headline government privacy science libya
y Why Iraq is Buying up Playstation 2's By packetstormsecurity.com Published On :: Tue, 19 Dec 2000 13:23:22 GMT Full Article iraq sony
y Pentagon Cyberwarriors Hit Iraq with Unsolicited Bulk Email By packetstormsecurity.com Published On :: Mon, 03 Mar 2003 05:00:55 GMT Full Article government email cyberwar iraq
y Iraq Collapse May Pose New WMD Threat, Say UN Monitors By packetstormsecurity.com Published On :: Thu, 21 Jun 2007 09:47:19 GMT Full Article privacy iraq
y Jamming Systems Play Secret Role In Iraq By packetstormsecurity.com Published On :: Mon, 13 Aug 2007 10:26:34 GMT Full Article iraq
y Iraq Government Launches Its Own Channel On YouTube By packetstormsecurity.com Published On :: Wed, 25 Nov 2009 01:58:19 GMT Full Article government iraq
y Wikileaks Releases Indiscriminate Slaying Video From Iraq By packetstormsecurity.com Published On :: Tue, 06 Apr 2010 22:12:40 GMT Full Article iraq
y Anonymous Releases Law Firm's Emails About Haditha Killings By packetstormsecurity.com Published On :: Tue, 07 Feb 2012 01:26:16 GMT Full Article headline data loss iraq anonymous
y Iraq Conflict Breeds Cyberwar Among Rival Factions By packetstormsecurity.com Published On :: Tue, 22 Jul 2014 15:10:51 GMT Full Article headline government cyberwar iraq
y Thai Police Shutter 5,000+ Sites Insulting Royals By packetstormsecurity.com Published On :: Thu, 15 Mar 2012 15:25:12 GMT Full Article headline government thailand censorship
y Three-Year Hunt Nabs Hacker Who Popularized Cybercrime By packetstormsecurity.com Published On :: Sat, 04 May 2013 15:46:54 GMT Full Article headline hacker government usa thailand
y Zotob Hacker Diabl0 Arrested In Bangkok After Three Year Hunt By packetstormsecurity.com Published On :: Wed, 19 Mar 2014 15:12:34 GMT Full Article headline hacker malware thailand
y Variety Jones, Alleged Silk Road Mentor, Arrested In Thailand By packetstormsecurity.com Published On :: Mon, 07 Dec 2015 15:02:54 GMT Full Article headline thailand
y Thailand: Nine Young, Alleged Hackers Detained By Military By packetstormsecurity.com Published On :: Mon, 26 Dec 2016 13:50:51 GMT Full Article headline hacker government data loss thailand
y Microsoft Is Helping Thai Military Government Spy On Web Users By packetstormsecurity.com Published On :: Thu, 26 Jan 2017 15:08:13 GMT Full Article headline government privacy microsoft spyware thailand
y Hackers Disrupt 51 Malaysian Government Websites By packetstormsecurity.com Published On :: Thu, 16 Jun 2011 10:52:16 GMT Full Article headline hacker government malaysia
y Cert Stolen From Malaysian Government Used To Sign Malware By packetstormsecurity.com Published On :: Tue, 15 Nov 2011 06:02:04 GMT Full Article headline government malware ssl malaysia
y Malaysian Election Sparks Denial Of Service By packetstormsecurity.com Published On :: Thu, 09 May 2013 15:07:38 GMT Full Article headline government denial of service malaysia
y Google Malaysia Site DNS Hacked By packetstormsecurity.com Published On :: Fri, 11 Oct 2013 15:24:13 GMT Full Article headline hacker dns google malaysia
y Fake Malaysia Airlines Links Spread Malware By packetstormsecurity.com Published On :: Tue, 18 Mar 2014 01:56:35 GMT Full Article headline malware malaysia
y Malaysia-Based Credit Card Fraud Ring Broken, 105 Arrested By packetstormsecurity.com Published On :: Sat, 09 Jul 2016 02:56:15 GMT Full Article headline bank cybercrime fraud malaysia
y It Sounds Like Everyone In Malaysia Has Been Pwned By packetstormsecurity.com Published On :: Thu, 02 Nov 2017 15:22:39 GMT Full Article headline hacker government privacy data loss malaysia
y HP Security Bulletin 2005-10.23 By packetstormsecurity.com Published On :: Sun, 28 Aug 2005 19:14:10 GMT HP Security Bulletin - A potential vulnerability has been identified with Openview Network Node Manager (OV NNM). This vulnerability could be exploited remotely by an unauthorized user to gain privileged access. Affected versions: Openview Network Node Manager (OV NNM) 6.2, 6.4, 7.01, 7.50 running on HP-UX, Solaris, Windows NT, Windows 2000, Windows XP, and Linux. Full Article
y Debian Linux Security Advisory 830-1 By packetstormsecurity.com Published On :: Tue, 04 Oct 2005 03:09:21 GMT Debian Security Advisory DSA 830-1 - Drew Parsons noticed that the post-installation script of ntlmaps, an NTLM authorization proxy server, changes the permissions of the configuration file to be world-readable. It contains the user name and password of the Windows NT system that ntlmaps connects to and, hence, leaks them to local users. Full Article
y EEYEB-20050523.txt By packetstormsecurity.com Published On :: Wed, 14 Dec 2005 07:57:35 GMT eEye Security Advisory - eEye Digital Security has discovered a local privilege escalation vulnerability in the Windows kernel that could allow any code executing on a Windows NT 4.0 or Windows 2000 system to elevate itself to the highest possible local privilege level (kernel). Full Article
y Cisco Security Advisory 20081022-asa By packetstormsecurity.com Published On :: Wed, 22 Oct 2008 22:50:17 GMT Cisco Security Advisory - Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances. These include Windows NT domain authentication bypass, IPv6 denial of service, and a Crypto Accelerator memory leak. Full Article
y Terminal Server License Bypass By packetstormsecurity.com Published On :: Mon, 11 Jan 2010 22:21:23 GMT This registry code allows any terminal client access to a Terminal Server. It bypasses the Microsoft "Terminal Server License" and allows the client to create a session on the server without a CAL (Client Access License) or MS Open License. It works on WinNT, Win2000, Win2003 server and Win2008 server. Full Article
y RegLookup Registry Parser 0.99.0 By packetstormsecurity.com Published On :: Mon, 02 May 2011 18:04:33 GMT RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later. Full Article
y RegLookup Registry Parser 1.0.0 By packetstormsecurity.com Published On :: Mon, 20 Jun 2011 08:35:37 GMT RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later. Full Article
y SyncBreeze 10.1.16 SEH GET Overflow By packetstormsecurity.com Published On :: Fri, 13 Oct 2017 13:42:47 GMT There exists an unauthenticated SEH based vulnerability in the HTTP server of Sync Breeze Enterprise version 10.1.16, when sending a GET request with an excessive length it is possible for a malicious user to overwrite the SEH record and execute a payload that would run under the Windows NT AUTHORITYSYSTEM account. The SEH record is overwritten with a "POP,POP,RET" pointer from the application library libspp.dll. This exploit has been successfully tested on Windows XP, 7 and 10 (x86->x64). It should work against all versions of Windows and service packs. Full Article
y South Africa Seeks to Improve Process for Renewable Energy Deals By feedproxy.google.com Published On :: 2014-08-27T15:53:00Z South African Energy Minister Tina Joemat-Pettersson said her department wants to address weaknesses in the process of commissioning renewable-power projects. Full Article Hydropower Baseload Bioenergy Wind Power Solar Geothermal
y Expect $1.6 Trillion in Clean Energy Investments Through 2020, Says IEA By feedproxy.google.com Published On :: 2014-08-28T14:32:00Z Investments in new clean-energy capacity will total $1.61 trillion through 2020 even as the expansion of renewables is expected to slow, the International Energy Agency said. Full Article Wind Power Solar