m Heartbleed Used To Uncover Data From Cyber-Criminals By packetstormsecurity.com Published On :: Tue, 29 Apr 2014 23:43:22 GMT Full Article headline cybercrime data loss fraud flaw ssl cryptography
m Silly Sysadmins Adding Heartbleed To Servers By packetstormsecurity.com Published On :: Fri, 09 May 2014 14:17:03 GMT Full Article headline privacy data loss flaw ssl cryptography
m Many Sites Reusing Heartbleed Compromised Private Keys By packetstormsecurity.com Published On :: Fri, 09 May 2014 23:22:10 GMT Full Article headline privacy data loss flaw ssl cryptography
m OpenSSL Man In The Middle Flaw Found After 16 Years By packetstormsecurity.com Published On :: Fri, 06 Jun 2014 12:47:38 GMT Full Article headline privacy flaw ssl cryptography
m Microsoft Warns Of Bogus Google And Yahoo SSL Certificates By packetstormsecurity.com Published On :: Fri, 11 Jul 2014 14:38:37 GMT Full Article headline privacy microsoft cybercrime fraud google yahoo ssl
m Lazy Sysadmins Rooted In Looming Mozilla Cert Wipeout By packetstormsecurity.com Published On :: Wed, 20 Aug 2014 15:06:42 GMT Full Article headline flaw ssl mozilla cryptography
m Mozilla Certificate Revocation Tanks 107,000 Sites By packetstormsecurity.com Published On :: Mon, 08 Sep 2014 21:28:21 GMT Full Article headline flaw ssl mozilla cryptography
m Novell ZENworks Configuration Management Remote Execution By packetstormsecurity.com Published On :: Tue, 02 Apr 2013 15:07:51 GMT This Metasploit module exploits a code execution flaw in Novell ZENworks Configuration Management 10 SP3 and 11 SP2. The vulnerability exists in the ZEnworks Control Center application, allowing an unauthenticated attacker to upload a malicious file outside of the TEMP directory and then make a second request that allows for arbitrary code execution. This Metasploit module has been tested successfully on Novell ZENworks Configuration Management 10 SP3 and 11 SP2 on Windows 2003 SP2 and SUSE Linux Enterprise Server 10 SP3. Full Article
m Mandriva Linux Security Advisory 2015-046 By packetstormsecurity.com Published On :: Thu, 12 Feb 2015 16:45:56 GMT Mandriva Linux Security Advisory 2015-046 - Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. Full Article
m Mandriva Linux Security Advisory 2015-140 By packetstormsecurity.com Published On :: Mon, 30 Mar 2015 21:48:37 GMT Mandriva Linux Security Advisory 2015-140 - If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. A remote unauthenticated attacker may craft special packets that trigger buffer overflows in the ntpd functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure(). The resulting buffer overflows may be exploited to allow arbitrary malicious code to be executed with the privilege of the ntpd process. A section of code in ntpd handling a rare error is missing a return statement, therefore processing did not stop when the error was encountered. This situation may be exploitable by an attacker. Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. The ntp package has been patched to fix these issues. Full Article
m IBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution By packetstormsecurity.com Published On :: Tue, 22 Aug 2017 05:44:56 GMT This Metasploit module exploits an unauthenticated remote PHP code execution vulnerability in IBM OpenAdmin Tool included with IBM Informix versions 11.5, 11.7, and 12.1. The 'welcomeServer' SOAP service does not properly validate user input in the 'new_home_page' parameter of the 'saveHomePage' method allowing arbitrary PHP code to be written to the config.php file. The config.php file is executed in most pages within the application, and accessible directly via the web root, resulting in code execution. This Metasploit module has been tested successfully on IBM OpenAdmin Tool 3.14 on Informix 12.10 Developer Edition (SUSE Linux 11) virtual appliance. Full Article
m Jury Scrutinizes DMCA in ElcomSoft Case By packetstormsecurity.com Published On :: Mon, 16 Dec 2002 04:01:13 GMT Full Article government dmca
m Elcomsoft Verdict Weakens the DMCA By packetstormsecurity.com Published On :: Wed, 18 Dec 2002 21:26:29 GMT Full Article dmca
m Adobe Urges More DMCA Busts By packetstormsecurity.com Published On :: Fri, 20 Dec 2002 12:02:28 GMT Full Article adobe dmca
m DMCA Blocks Tech Progress By packetstormsecurity.com Published On :: Thu, 20 Feb 2003 04:22:07 GMT Full Article dmca
m DMCA Strikes Again - First Amendment Does Not Apply By packetstormsecurity.com Published On :: Thu, 10 Apr 2003 04:35:11 GMT Full Article dmca
m Security Research Exception To DMCA Considered By packetstormsecurity.com Published On :: Tue, 13 May 2003 07:52:12 GMT Full Article dmca
m Court Confirms DMCA Good Faith Web Site Shut Down By packetstormsecurity.com Published On :: Fri, 30 May 2003 17:16:09 GMT Full Article government dmca
m Jury Convicts DirecTV Pirate On DMCA Charges By packetstormsecurity.com Published On :: Tue, 23 Sep 2003 14:42:48 GMT Full Article government dmca
m Court Adds New DMCA Exceptions By packetstormsecurity.com Published On :: Wed, 29 Oct 2003 02:40:24 GMT Full Article government dmca
m Diebold Uses DMCA to Conceal E-Voting Machine Flaws By packetstormsecurity.com Published On :: Wed, 29 Oct 2003 22:45:15 GMT Full Article government flaw dmca
m E-Voting Vendor Sued For DMCA Takedown By packetstormsecurity.com Published On :: Tue, 04 Nov 2003 01:16:59 GMT Full Article dmca
m DMCA Fails to Stop Garage Door Opener By packetstormsecurity.com Published On :: Fri, 14 Nov 2003 05:50:10 GMT Full Article dmca
m Diebold Retracts DMCA Threats By packetstormsecurity.com Published On :: Tue, 02 Dec 2003 06:19:58 GMT Full Article dmca
m Kazaa Threatens Google with DMCA Letter By packetstormsecurity.com Published On :: Mon, 08 Dec 2003 12:51:49 GMT Full Article google dmca
m Seeking Changes To The DMCA By packetstormsecurity.com Published On :: Fri, 31 Mar 2006 02:02:51 GMT Full Article dmca
m US Congress Readies Super DMCA By packetstormsecurity.com Published On :: Tue, 25 Apr 2006 15:06:54 GMT Full Article government usa dmca
m Coupon Hacker Faces DMCA Lawsuit By packetstormsecurity.com Published On :: Mon, 20 Aug 2007 09:50:29 GMT Full Article hacker government dmca
m Coupons, Inc. Drops DMCA Lawsuit Against Coupon Hacker By packetstormsecurity.com Published On :: Fri, 21 Nov 2008 05:21:08 GMT Full Article hacker government dmca
m Hackers, Others Seek DMCA Exemptions By packetstormsecurity.com Published On :: Wed, 03 Dec 2008 05:30:42 GMT Full Article hacker dmca
m Apple Files Opposition To DMCA Exemption For Jailbreaking By packetstormsecurity.com Published On :: Fri, 13 Feb 2009 12:00:58 GMT Full Article phone dmca apple
m Demonoid Still Down One Week After Massive DDoS Attack By packetstormsecurity.com Published On :: Wed, 01 Aug 2012 15:01:18 GMT Full Article headline denial of service riaa dmca mpaa pirate
m Microsoft Cites BBC, Wikipedia In Error-Filled DMCA Takedown By packetstormsecurity.com Published On :: Mon, 08 Oct 2012 17:12:00 GMT Full Article headline microsoft dmca
m WTF! It Should Not Be Illegal To Hack Your Own Car's Computer By packetstormsecurity.com Published On :: Fri, 23 Jan 2015 15:33:39 GMT Full Article headline hacker government usa dmca
m IOActive Gagged By DMCA On Eve Of Wireless Key Vuln Reveal By packetstormsecurity.com Published On :: Wed, 06 May 2015 13:47:37 GMT Full Article headline wireless flaw dmca
m Rebel Hackers Seize Libyan Domain Name Registry By packetstormsecurity.com Published On :: Mon, 22 Aug 2011 14:05:57 GMT Full Article headline hacker libya
m Libyan Rebels Are Flying Their Own Minidrone By packetstormsecurity.com Published On :: Wed, 24 Aug 2011 02:20:49 GMT Full Article headline libya
m Satellite Photos Take You Inside Gadhafi's Compound By packetstormsecurity.com Published On :: Sat, 27 Aug 2011 14:03:12 GMT Full Article headline libya
m US Military Debated Hacking Libyan Air Defenses By packetstormsecurity.com Published On :: Mon, 17 Oct 2011 22:46:50 GMT Full Article headline government usa cyberwar libya
m Gaddafi Death Reports Likely To Spawn Multiple Scams By packetstormsecurity.com Published On :: Thu, 20 Oct 2011 23:22:09 GMT Full Article headline scam libya
m Intelligence Official Offers New Timeline For Benghazi Attack By packetstormsecurity.com Published On :: Fri, 02 Nov 2012 04:10:00 GMT Full Article headline government usa terror libya
m Pentagon Cyberwarriors Hit Iraq with Unsolicited Bulk Email By packetstormsecurity.com Published On :: Mon, 03 Mar 2003 05:00:55 GMT Full Article government email cyberwar iraq
m US Marine Unearths Nukes, Cocaine, And $25 Million By packetstormsecurity.com Published On :: Mon, 04 Sep 2006 22:16:23 GMT Full Article usa iraq
m Iraq Collapse May Pose New WMD Threat, Say UN Monitors By packetstormsecurity.com Published On :: Thu, 21 Jun 2007 09:47:19 GMT Full Article privacy iraq
m Jamming Systems Play Secret Role In Iraq By packetstormsecurity.com Published On :: Mon, 13 Aug 2007 10:26:34 GMT Full Article iraq
m Hackers Attack Iraq's Vulnerable Computers By packetstormsecurity.com Published On :: Fri, 29 Aug 2008 02:42:49 GMT Full Article hacker iraq
m Special Forces Getting High-Tech Soldier Suits For Iraq Mission By packetstormsecurity.com Published On :: Wed, 22 Jul 2009 20:13:43 GMT Full Article iraq
m Iraq Government Launches Its Own Channel On YouTube By packetstormsecurity.com Published On :: Wed, 25 Nov 2009 01:58:19 GMT Full Article government iraq
m Wikileaks Releases Indiscriminate Slaying Video From Iraq By packetstormsecurity.com Published On :: Tue, 06 Apr 2010 22:12:40 GMT Full Article iraq
m Will 400,000 Secret Iraq War Document Restore WikiLeaks' Sheen? By packetstormsecurity.com Published On :: Fri, 15 Oct 2010 15:05:16 GMT Full Article iraq