cl T20-2020 BIOVIA Direct 2020: Support of BIOVIA Direct on Oracle Exadata Database Machine By www.3ds.com Published On :: Wed, 11 Mar 2020 11:34:14 +0100 BIOVIA Direct 2020 Full Article BIOVIA Tech Notes BIOVIA Content
cl Salt Bugs Allow Full RCE As Root On Cloud Servers By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:36:48 GMT Full Article headline flaw
cl OpenSMTPD Local Information Disclosure By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:29:54 GMT Qualys discovered a minor vulnerability in OpenSMTPD, OpenBSD's mail server. An unprivileged local attacker can read the first line of an arbitrary file (for example, root's password hash in /etc/master.passwd) or the entire contents of another user's file (if this file and /var/spool/smtpd/ are on the same filesystem). A proof of concept exploit is included in this archive. Full Article
cl Hackers Claim RFID Smart-Card Hack, But Vendor Disagrees By packetstormsecurity.com Published On :: Wed, 05 Mar 2008 08:16:12 GMT Full Article hacker rfid
cl Syrian Electronic Army Claims CNN As Its Latest Victim By packetstormsecurity.com Published On :: Fri, 24 Jan 2014 16:14:29 GMT Full Article headline hacker syria
cl ASP Forums 2.1 Database Disclosure By packetstormsecurity.com Published On :: Sat, 06 Feb 2016 09:02:22 GMT ASP Forums version 2.1 suffers from a database disclosure vulnerability. Full Article
cl ASP Gateway 1.0.0 Database Disclosure By packetstormsecurity.com Published On :: Mon, 31 Oct 2016 03:33:33 GMT ASP Gateway 1.0.0 suffers from a database disclosure vulnerability. Full Article
cl ZyXEL P-660HN-T1 V2 Missing Authentication / Password Disclosure By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:27:39 GMT The ZyXEL P-660HN-T1 V2 rpWLANRedirect.asp page is missing authentication and discloses an administrator password. Full Article
cl Card Skimming Malware Found On Heroku Cloud Platform By packetstormsecurity.com Published On :: Wed, 04 Dec 2019 23:47:04 GMT Full Article headline malware bank cybercrime fraud
cl IBM And Verizon Take Security To The Cloud By packetstormsecurity.com Published On :: Thu, 01 Apr 2010 09:48:34 GMT Full Article ibm
cl China To Investigate IBM, EMC, Oracle Over NSA Spying By packetstormsecurity.com Published On :: Fri, 16 Aug 2013 15:23:12 GMT Full Article headline government privacy ibm usa china data loss spyware oracle nsa
cl EFF Claims Vietnam Is Performing Spear Phishing By packetstormsecurity.com Published On :: Tue, 21 Jan 2014 16:24:32 GMT Full Article headline government fraud phish vietnam
cl John McAfee Now Claims He Has A Spy Ring In The Belize Government By packetstormsecurity.com Published On :: Tue, 08 Jan 2013 04:31:22 GMT Full Article headline government spyware mcafee
cl McAfee Claims Ashley Madison Hack Could Destabilize Society By packetstormsecurity.com Published On :: Fri, 24 Jul 2015 14:24:46 GMT Full Article headline hacker privacy data loss mcafee
cl EnumJavaLibs Java Classpath Enumerator By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 15:20:32 GMT EnumJavaLibs is a tool that can be used to discover which libraries are loaded (i.e. available on the classpath) by a remote Java application when it supports deserialization. Full Article
cl Dismantling Megamos Crypto: Wirelessly Lockpicking A Vehicle Immobilizer By packetstormsecurity.com Published On :: Fri, 14 Aug 2015 13:02:14 GMT The Megamos Crypto transponder is used in one of the most widely deployed electronic vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and Volvo cars. Such an immobilizer is an anti-theft device which prevents the engine of the vehicle from starting when the corresponding transponder is not present. This transponder is a passive RFID tag which is embedded in the key of the vehicle. In this paper, the authors have reverse-engineered all proprietary security mechanisms of the transponder, including the cipher and the authentication protocol which we publish here in full detail. This article reveals several weaknesses in the design of the cipher, the authentication protocol and also in their implementation. Full Article
cl Ubiquiti Networks UniFi Cloud Key Command Injection / Privilege Escalation By packetstormsecurity.com Published On :: Thu, 27 Jul 2017 18:22:22 GMT Ubiquiti Networks UniFi Cloud Key with firmware versions 0.5.9 and 0.6.0 suffer from weak crypto, privilege escalation, and command injection vulnerabilities. Full Article
cl RSA BSAFE SSL-J / Crypto-J Heap Clearing / Timing Channel By packetstormsecurity.com Published On :: Fri, 07 Sep 2018 14:02:22 GMT RSA BSAFE SSL-J versions prior to 6.2.4 contain a heap inspection vulnerability that could allow an attacker with physical access to the system to recover sensitive key material. RSA BSAFE SSL-J versions prior to 6.2.4 contain a covert timing channel vulnerability during RSA decryption, also known as a Bleichenbacher attack on RSA decryption. A remote attacker may be able to recover a RSA key. RSA BSAFE Crypto-J versions prior to 6.2.4 and RSA BSAFE SSL-J versions prior to 6.2.4 contain a covert timing channel vulnerability during PKCS #1 unpadding operations, also known as a Bleichenbacher attack. A remote attacker may be able to recover a RSA key. Full Article
cl Apache2 Web Server Hardening Article By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 15:20:36 GMT This is an article discussing Apache2 Web Server hardening. Written in Turkish. Full Article
cl Facebook's Sir Nick Clegg Criticized Over WhatsApp Security By packetstormsecurity.com Published On :: Fri, 24 Jan 2020 16:52:25 GMT Full Article headline hacker privacy flaw facebook cryptography
cl CloudFlare Probes Mystery Interception Of Site Traffic Across India By packetstormsecurity.com Published On :: Thu, 14 Jul 2016 14:30:56 GMT Full Article headline privacy india
cl Indian Telco Reliance Jio Denies Claims Of 100m Record Data Breach By packetstormsecurity.com Published On :: Tue, 11 Jul 2017 13:59:22 GMT Full Article headline privacy phone india data loss
cl Indian Government Confirms Cyberattack On Nuclear Plant By packetstormsecurity.com Published On :: Tue, 05 Nov 2019 15:11:55 GMT Full Article headline government india cyberwar
cl $100k Paid Out For Google Cloud Shell Root Compromise By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:49:12 GMT Full Article headline hacker flaw google
cl Lotus Core CMS 1.0.1 Local File Inclusion By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:29:56 GMT Lotus Core CMS version 1.0.1 suffers from a local file inclusion vulnerability. Full Article
cl SuiteCRM 7.11.11 Broken Access Control / Local File Inclusion By packetstormsecurity.com Published On :: Thu, 13 Feb 2020 15:49:06 GMT SuiteCRM versions 7.11.11 and below suffer from an add_to_prospect_list broken access control that allows for local file inclusion attacks. Full Article
cl Apache Tomcat AJP Ghostcat File Read / Inclusion By packetstormsecurity.com Published On :: Wed, 26 Feb 2020 07:22:22 GMT Apache Tomcat AJP Ghostcat file read and inclusion exploit. Full Article
cl FIBARO System Home Center 5.021 Remote File Inclusion / XSS By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:12:32 GMT FIBARO System Home Center version 5.021 suffers from cross site scripting and remote file inclusion vulnerabilities. Full Article
cl Ac4p.com Gallery 1.0 Cross Site Scripting / Shell Upload / Bypass / Disclosure By packetstormsecurity.com Published On :: Tue, 23 Feb 2010 07:00:24 GMT Ac4p.com Gallery version 1.0 suffers from cross site scripting, phpinfo disclosure, shell upload, and insecure cookie handling vulnerabilities. Full Article
cl Symantec Creates Cloud To Battle Targeted Attacks By packetstormsecurity.com Published On :: Wed, 30 Oct 2013 15:12:32 GMT Full Article headline cybercrime fraud cyberwar symantec phish
cl Symantec Flaws As Bad As It Gets, Claims Google's Project Zero By packetstormsecurity.com Published On :: Thu, 30 Jun 2016 02:19:04 GMT Full Article headline flaw google symantec backdoor
cl Cisco Warns Customers Of Critical Flaws, Including Struts By packetstormsecurity.com Published On :: Thu, 06 Sep 2018 13:13:53 GMT Full Article headline flaw patch cisco
cl Lights That Warn Planes Of Obstacles Were Exposed To Open Internet By packetstormsecurity.com Published On :: Fri, 22 Nov 2019 15:38:21 GMT Full Article headline hacker flaw terror
cl Online Clothing Store 1.0 Arbitrary File Upload By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:26:30 GMT Online Clothing Store version 1.0 suffers from an arbitrary file upload vulnerability. Full Article
cl NSA Clears The Galaxy Note 4 And Galaxy S5 For Government Use By packetstormsecurity.com Published On :: Tue, 21 Oct 2014 13:12:14 GMT Full Article headline government usa phone nsa samsung
cl Equifax Settles Class-Action Breach Lawsuit For $380.5 Million By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:22:22 GMT Full Article headline hacker privacy bank data loss fraud identity theft
cl Microsoft Discloses Security Breach Of Customer Support Database By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 15:57:33 GMT Full Article headline hacker privacy microsoft data loss identity theft
cl New Class Of SQLite Exploits Open Door To iPhone Hack By packetstormsecurity.com Published On :: Sun, 11 Aug 2019 18:14:40 GMT Full Article headline phone database flaw apple conference
cl Horde Groupware Webmail Edition 5.2.22 PHP File Inclusion By packetstormsecurity.com Published On :: Thu, 12 Mar 2020 20:10:33 GMT Horde Groupware Webmail Edition version 5.2.22 suffers from a PHP file inclusion vulnerability. Full Article
cl Oracle Patches Another Actively Exploited WebLogic 0-Day By packetstormsecurity.com Published On :: Wed, 19 Jun 2019 17:09:10 GMT Full Article headline hacker flaw oracle
cl Oracle Patches 218 Security Vulnerabilities By packetstormsecurity.com Published On :: Thu, 17 Oct 2019 14:06:58 GMT Full Article headline database flaw patch oracle
cl Half Of Oracle E-Business Customers Open To Bank Fraud Flaw By packetstormsecurity.com Published On :: Wed, 20 Nov 2019 15:01:28 GMT Full Article headline bank cybercrime fraud flaw oracle
cl Oracle Just Released A Whopping 334 Security Fixes In Critical Patch Update By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:22:26 GMT Full Article headline database flaw patch oracle
cl VideoLAN Client (VLC) Win32 smb:// URI Buffer Overflow By packetstormsecurity.com Published On :: Mon, 15 Feb 2010 22:09:31 GMT This Metasploit module exploits a stack-based buffer overflow in the Win32AddConnection function of the VideoLAN VLC media player. Versions 0.9.9 throught 1.0.1 are reportedly affected. This vulnerability is only present in Win32 builds of VLC. This payload was found to work with the windows/exec and windows/meterpreter/reverse_tcp payloads. However, the windows/meterpreter/reverse_ord_tcp was found not to work. Full Article
cl SetNamedSecurityInfo() Ignores / Destroys Protected DACLs / SACLs By packetstormsecurity.com Published On :: Tue, 19 Jun 2012 18:23:33 GMT With Windows 2000 Microsoft introduced the inheritance of access rights and new Win32-API functions like SetNamedSecurityInfo() which handle the inheritance. SetNamedSecurityInfo() but has a serious bug: it applies inheritable ACEs from a PARENT object to a target object even if it must not do so, indicated by the flags SE_DACL_PROTECTED and/or SE_SACL_PROTECTED in the security descriptor of the target object. Full Article
cl UK Electronic Passports Cloned Within Minutes By packetstormsecurity.com Published On :: Thu, 07 Aug 2008 22:39:58 GMT Full Article britain passport
cl THC/vonJeek Provide You The Ability To Clone ePassports By packetstormsecurity.com Published On :: Mon, 29 Sep 2008 17:01:48 GMT Full Article passport
cl Passport RFIDs Cloned Wholesale By $250 eBay Auction Spree By packetstormsecurity.com Published On :: Mon, 02 Feb 2009 10:50:48 GMT Full Article passport ebay
cl Hacker War Drives San Francisco Cloning RFID Passports By packetstormsecurity.com Published On :: Mon, 02 Feb 2009 14:33:30 GMT Full Article hacker usa passport rfid
cl TP-LINK Cloud Cameras NCXXX SetEncryptKey Command Injection By packetstormsecurity.com Published On :: Fri, 01 May 2020 23:55:55 GMT TP-LINK Cloud Cameras including products NC260 and NC450 suffer from a command injection vulnerability. The issue is located in the httpSetEncryptKeyRpm method (handler for /setEncryptKey.fcgi) of the ipcamera binary, where the user-controlled EncryptKey parameter is used directly as part of a command line to be executed as root without any input sanitization. Full Article