OK
https://packetstormsecurity.com/
Websites
Runtime: 1.9s
On November 22, 2024, 08:39 AM UTC, https://packetstormsecurity.com/ was accessible when tested on AS47394 in Albania.
Failures
HTTP Experiment
null
DNS Experiment
null
Control
null
DNS Queries
Resolver:
208.69.35.165
Query:
IN A packetstormsecurity.com
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
198.84.60.198
TCP Connections
Connection to 198.84.60.198:443 succeeded.
HTTP Requests
URL
GET https://packetstormsecurity.com/
Response Headers
Cache-Control:no-cache, no-store, private, must-revalidate, proxy-revalidateConnection:keep-aliveContent-Type:text/html; charset=utf-8Date:Fri, 22 Nov 2024 08:39:56 GMTExpires:0Server:nginxSet-Cookie:P=0; expires=Fri, 5-May-1999 05:05:05 GMT; domain=.packetstormsecurity.com; path=/; HttpOnly; secureStrict-Transport-Security:max-age=3600Vary:Accept-EncodingX-Content-Type-Options:nosniffX-Frame-Options:SAMEORIGINX-Xss-Protection:1; mode=block
Response Body
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-type" content="text/html;charset=utf-8" /> <title>Packet Storm</title> <meta name="description" content="Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers" /> <meta name="keywords" content="security,exploit,advisory,whitepaper,xss,csrf,overflow,scanner,vulnerability" /> <link rel="shortcut icon" href="/img/pss.ico" /> <link rel="stylesheet" media="screen,print,handheld" href="https://packetstatic.com/css1651606189/pss.css" type="text/css" /> <!--[if lt ie 8]><link rel="stylesheet" type="text/css" href="https://packetstatic.com/css1651606189/ie.css" /><![endif]--> <script type="text/javascript" src="https://packetstatic.com/js1651606189/pt.js"></script> <script type="text/javascript" src="https://packetstatic.com/js1651606189/pss.js"></script> <link rel="search" type="application/opensearchdescription+xml" href="https://packetstormsecurity.com/opensearch.xml" title="Packet Storm Site Search" /> <link rel="alternate" type="application/rss+xml" title="Packet Storm Headlines" href="https://rss.packetstormsecurity.com/news/" /> <link rel="alternate" type="application/rss+xml" title="Packet Storm Recent Files" href="https://rss.packetstormsecurity.com/files/" /> <link rel="alternate" type="application/rss+xml" title="Packet Storm Exploits" href="https://rss.packetstormsecurity.com/files/tags/exploit/" /> <link rel="alternate" type="application/rss+xml" title="Packet Storm Advisories" href="https://rss.packetstormsecurity.com/files/tags/advisory/" /> </head> <body id="home"> <div id="t"> <div id="tc"> <a id="top" href="/"><img src="https://packetstatic.com/img1514015884/ps_logo.png" width="315" height="65" id="logo" alt="packet storm" /></a> <div id="slogan">what you don't know can hurt you </div> <div id="account"><a href="https://packetstormsecurity.com/account/register/">Register</a> | <a href="https://packetstormsecurity.com/account/login/">Login</a></div> <div id="search"> <form method="get" action="/search/"><input type="text" name="q" id="q" maxlength="120" value="Search …" /><button type="submit"></button><div id="q-tabs"><label for="s-files" class="on">Files</label><label for="s-news">News</label><label for="s-users">Users</label><label for="s-authors">Authors</label><input type="radio" value="files" name="s" id="s-files" /><input type="radio" value="news" name="s" id="s-news" /><input type="radio" value="users" name="s" id="s-users" /><input type="radio" value="authors" name="s" id="s-authors" /></div></form> </div> </div> <div id="tn"><div id="tnc"> <a href="/" id="tn-home"><span>Home</span></a> <a href="/files/" id="tn-files"><span>Files</span></a> <a href="/news/" id="tn-news"><span>News</span></a> &[SERVICES_TAB]<a href="/about/" id="tn-about"><span>About</span></a> <a href="/contact/" id="tn-contact"><span>Contact</span></a> <a href="/submit/" id="tn-submit"><span>Add New</span></a> </div></div> <div id="tn2"></div> </div> <div id="c"> <div id="cc"> <div id="m"> <div id="news-headline"><dl id="N36624" class="news first"> <dd class="detail sd"><a href="/news/view/36624/Ubuntu-Affected-By-10-Year-Old-Flaws-In-needrestart-Package.html"><img src="https://packetstatic.com/art/c/cryingpenguin-420.jpg" width="420" alt="" /></a></dd> <dt><a href="/news/view/36624/Ubuntu-Affected-By-10-Year-Old-Flaws-In-needrestart-Package.html">Ubuntu Affected By 10-Year-Old Flaws In needrestart Package</a></dt> </dl> <dl id="N36622" class="news"> <dd class="detail sd"><a href="/news/view/36622/MITRE-Updates-List-Of-25-Most-Dangerous-Software-Vulnerabilities.html"><img src="https://packetstatic.com/art/b/blacklisted-100.jpg" width="100" alt="" /></a></dd> <dt><a href="/news/view/36622/MITRE-Updates-List-Of-25-Most-Dangerous-Software-Vulnerabilities.html">MITRE Updates List Of 25 Most Dangerous Software Vulnerabilities</a></dt> </dl> <dl id="N36621" class="news"> <dd class="detail sd"><a href="/news/view/36621/North-Korean-Hackers-Behind-2019-42-Million-Ethereum-Heist.html"><img src="https://packetstatic.com/art/k/kimjongunhacking-100.jpg" width="100" alt="" /></a></dd> <dt><a href="/news/view/36621/North-Korean-Hackers-Behind-2019-42-Million-Ethereum-Heist.html">North Korean Hackers Behind 2019 $42 Million Ethereum Heist</a></dt> </dl> <dl id="N36623" class="news"> <dd class="detail sd"><a href="/news/view/36623/FBI-And-CISA-Warn-Of-Continued-Cyberattacks-On-US-Telecoms.html"><img src="https://packetstatic.com/art/c/cisa-100.jpg" width="100" alt="" /></a></dd> <dt><a href="/news/view/36623/FBI-And-CISA-Warn-Of-Continued-Cyberattacks-On-US-Telecoms.html">FBI And CISA Warn Of Continued Cyberattacks On US Telecoms</a></dt> </dl> </div><div id="files-home"> <h2>Recent Files</h2><a href="https://rss.packetstormsecurity.com/files/" class="rss-home"><img src="https://packetstatic.com/img1514015884/bt_rss.gif" width="16" height="16" alt="Files RSS Feed" /></a> <div class="tab-box"><div id="lv" title="Toggle List View"></div><ul class="tabs"><li class="tab on"><a href="/files/">All</a></li><li class="tab"><a href="/files/tags/exploit/">Exploits</a></li><li class="tab"><a href="/files/tags/advisory/">Advisories</a></li><li class="tab"><a href="/files/tags/tool/">Tools</a></li><li class="tab"><a href="/files/tags/paper/">Whitepapers</a></li><li class="tab"><a href="/files/tags/">Other</a></li></ul><div class="tabs-cut"></div></div> <div id="files-home-list"> <dl id="F182719" class="file first"> <dt><a class="ico text-plain" href="/files/182719/Ivanti-EPM-Agent-Portal-Command-Execution.html" title="Size: 9.3 KB">Ivanti EPM Agent Portal Command Execution</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-21/" title="15:38:56 UTC">Nov 21, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/8679/" class="person">Spencer McIntyre</a>, <a href="/files/author/16319/" class="person">James Horseman</a>, <a href="/files/author/16451/" class="person">Zach Hanley</a> | Site <a href="http://www.metasploit.com">metasploit.com</a></dd> <dd class="detail"><p>This Metasploit module leverages an unauthenticated remote command execution vulnerability in Ivanti's EPM Agent Portal where an RPC client can invoke a method which will run an attacker-specified string on the remote target as NT AUTHORITY\SYSTEM. This vulnerability is present in versions prior to EPM 2021.1 Su4 and EPM 2022 Su2.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/remote">remote</a></dd> <dd class="act-links"><a href="/files/download/182719/ivanti_agent_portal_cmdexec.rb.txt" title="Size: 9.3 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182719/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182719/Ivanti-EPM-Agent-Portal-Command-Execution.html">View</span></a></dd> </dl> <dl id="F182718" class="file"> <dt><a class="ico text-plain" href="/files/182718/Judge0-Sandbox-Escape.html" title="Size: 5.6 KB">Judge0 Sandbox Escape</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-21/" title="15:38:24 UTC">Nov 21, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/17250/" class="person">Takahiro Yokoyama</a> | Site <a href="http://www.metasploit.com">metasploit.com</a></dd> <dd class="detail"><p>Judge0 does not account for symlinks placed inside the sandbox directory, which can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/arbitrary">arbitrary</a>, <a href="/files/tags/code_execution">code execution</a></dd> <dd class="act-links"><a href="/files/download/182718/judge0_sandbox_escape_cve_2024_28189.rb.txt" title="Size: 5.6 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182718/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182718/Judge0-Sandbox-Escape.html">View</span></a></dd> </dl> <dl id="F182717" class="file"> <dt><a class="ico application-x-xz" href="/files/182717/Wireshark-Analyzer-4.4.2.html" title="Size: 44.6 MB">Wireshark Analyzer 4.4.2</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-21/" title="15:35:51 UTC">Nov 21, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/110/" class="person">Gerald Combs</a> | Site <a href="http://www.wireshark.org/">wireshark.org</a></dd> <dd class="detail"><p>Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.</p></dd> <dd class="change"><span>Changes</span>: dfilter to not crash on failed IEEE 11073 float conversions. Qt 6.8 deprecations. Update manuf, services enterprise numbers, translations, and other items. Various other bug fixes and updates. </dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/tool">tool</a>, <a href="/files/tags/sniffer">sniffer</a>, <a href="/files/tags/protocol">protocol</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/windows">windows</a>, <a href="/files/os/unix">unix</a></dd> <dd class="act-links"><a href="/files/download/182717/wireshark-4.4.2.tar.xz" title="Size: 44.6 MB" rel="nofollow">Download</a> | <a href="/files/favorite/182717/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182717/Wireshark-Analyzer-4.4.2.html">View</span></a></dd> </dl> <dl id="F182716" class="file"> <dt><a class="ico application-x-gzip" href="/files/182716/Falco-0.39.2.html" title="Size: 6.3 MB">Falco 0.39.2</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-21/" title="15:34:42 UTC">Nov 21, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/12386/" class="person">Sysdig</a> | Site <a href="https://sysdig.org/falco/">sysdig.org</a></dd> <dd class="detail"><p>Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.</p></dd> <dd class="change"><span>Changes</span>: A couple updates to cmake and one to ci. </dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/tool">tool</a>, <a href="/files/tags/intrusion_detection">intrusion detection</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/unix">unix</a></dd> <dd class="act-links"><a href="/files/download/182716/falco-0.39.2.tar.gz" title="Size: 6.3 MB" rel="nofollow">Download</a> | <a href="/files/favorite/182716/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182716/Falco-0.39.2.html">View</span></a></dd> </dl> <dl id="F182715" class="file"> <dt><a class="ico text-plain" href="/files/182715/Ubuntu-Security-Notice-USN-7118-1.html" title="Size: 1.9 KB">Ubuntu Security Notice USN-7118-1</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-21/" title="15:09:10 UTC">Nov 21, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7118-1 - It was discovered that ZBar did not properly handle certain QR codes. If a user or automated system using ZBar were tricked into opening a specially crafted file, an attacker could possibly use this to obtain sensitive information. It was discovered that ZBar did not properly handle certain QR codes. If a user or automated system using ZBar were tricked into opening a specially crafted file, an attacker could possibly use this to obtain sensitive information. This issue only affected Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182715/USN-7118-1.txt" title="Size: 1.9 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182715/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182715/Ubuntu-Security-Notice-USN-7118-1.html">View</span></a></dd> </dl> <dl id="F182714" class="file"> <dt><a class="ico text-plain" href="/files/182714/Ubuntu-Security-Notice-USN-7091-2.html" title="Size: 2 KB">Ubuntu Security Notice USN-7091-2</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-21/" title="15:08:56 UTC">Nov 21, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7091-2 - USN-7091-1 fixed several vulnerabilities in Ruby. This update provides the corresponding update for ruby2.7 in Ubuntu 20.04 LTS. It was discovered that Ruby incorrectly handled parsing of an XML document that has specific XML characters in an attribute value using REXML gem. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. This issue only affected in Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. It was discovered that Ruby incorrectly handled parsing of an XML document that has many entity expansions with SAX2 or pull parser API. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. It was discovered that Ruby incorrectly handled parsing of an XML document that has many digits in a hex numeric character reference. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/denial_of_service">denial of service</a>, <a href="/files/tags/vulnerability">vulnerability</a>, <a href="/files/tags/ruby">ruby</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182714/USN-7091-2.txt" title="Size: 2 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182714/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182714/Ubuntu-Security-Notice-USN-7091-2.html">View</span></a></dd> </dl> <dl id="F182713" class="file"> <dt><a class="ico application-x-gzip" href="/files/182713/Zeek-6.0.9.html" title="Size: 57.4 MB">Zeek 6.0.9</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-20/" title="16:01:58 UTC">Nov 20, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/11509/" class="person">Robin Sommer</a>, <a href="/files/author/11510/" class="person">Vern Paxson</a> | Site <a href="https://www.zeek.org/">zeek.org</a></dd> <dd class="detail"><p>Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.</p></dd> <dd class="change"><span>Changes</span>: The input framework will no longer get stuck and use 100% of the CPU when encountering lines not immediately terminated by a new line. The Modbus analyzer added some additional protocol checks and should no longer over-match on traffic that's not specifically on port 502. </dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/tool">tool</a>, <a href="/files/tags/intrusion_detection">intrusion detection</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/unix">unix</a></dd> <dd class="act-links"><a href="/files/download/182713/zeek-6.0.9.tar.gz" title="Size: 57.4 MB" rel="nofollow">Download</a> | <a href="/files/favorite/182713/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182713/Zeek-6.0.9.html">View</span></a></dd> </dl> <dl id="F182712" class="file"> <dt><a class="ico text-plain" href="/files/182712/Debian-Security-Advisory-5816-1.html" title="Size: 2.3 KB">Debian Security Advisory 5816-1</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-20/" title="15:51:11 UTC">Nov 20, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/2821/" class="company">Debian</a> | Site <a href="http://www.debian.org/security">debian.org</a></dd> <dd class="detail"><p>Debian Linux Security Advisory 5816-1 - The Qualys Threat Research Unit discovered that libmodule-scandeps-perl, a Perl module to recursively scan Perl code for dependencies, allows an attacker to execute arbitrary shell commands via specially crafted file names.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/arbitrary">arbitrary</a>, <a href="/files/tags/shell">shell</a>, <a href="/files/tags/perl">perl</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/debian">debian</a></dd> <dd class="act-links"><a href="/files/download/182712/dsa-5816-1.txt" title="Size: 2.3 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182712/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182712/Debian-Security-Advisory-5816-1.html">View</span></a></dd> </dl> <dl id="F182711" class="file"> <dt><a class="ico text-plain" href="/files/182711/Debian-Security-Advisory-5815-1.html" title="Size: 2.8 KB">Debian Security Advisory 5815-1</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-20/" title="15:50:55 UTC">Nov 20, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/2821/" class="company">Debian</a> | Site <a href="http://www.debian.org/security">debian.org</a></dd> <dd class="detail"><p>Debian Linux Security Advisory 5815-1 - The Qualys Threat Research Unit discovered several local privilege escalation vulnerabilities in needrestart, a utility to check which daemons need to be restarted after library upgrades. A local attacker can execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable (CVE-2024-48990) or running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable (CVE-2024-48992). Additionally a local attacker can trick needrestart into running a fake Python interpreter (CVE-2024-48991) or cause needrestart to call the Perl module Module::ScanDeps with attacker-controlled files (CVE-2024-11003).</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/arbitrary">arbitrary</a>, <a href="/files/tags/local">local</a>, <a href="/files/tags/root">root</a>, <a href="/files/tags/perl">perl</a>, <a href="/files/tags/vulnerability">vulnerability</a>, <a href="/files/tags/python">python</a>, <a href="/files/tags/ruby">ruby</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/debian">debian</a></dd> <dd class="act-links"><a href="/files/download/182711/dsa-5815-1.txt" title="Size: 2.8 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182711/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182711/Debian-Security-Advisory-5815-1.html">View</span></a></dd> </dl> <dl id="F182710" class="file"> <dt><a class="ico text-plain" href="/files/182710/Ubuntu-Security-Notice-USN-7123-1.html" title="Size: 11.7 KB">Ubuntu Security Notice USN-7123-1</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-20/" title="15:50:31 UTC">Nov 20, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7123-1 - It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate certain SMB messages, leading to an out-of-bounds read vulnerability. An attacker could use this to cause a denial of service or possibly expose sensitive information. Supraja Sridhara, Benedict Schlüter, Mark Kuhne, Andrin Bertschi, and Shweta Shinde discovered that the Confidential Computing framework in the Linux kernel for x86 platforms did not properly handle 32-bit emulation on TDX and SEV. An attacker with access to the VMM could use this to cause a denial of service or possibly execute arbitrary code.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/denial_of_service">denial of service</a>, <a href="/files/tags/arbitrary">arbitrary</a>, <a href="/files/tags/x86">x86</a>, <a href="/files/tags/kernel">kernel</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182710/USN-7123-1.txt" title="Size: 11.7 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182710/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182710/Ubuntu-Security-Notice-USN-7123-1.html">View</span></a></dd> </dl> <dl id="F182709" class="file"> <dt><a class="ico text-plain" href="/files/182709/Ubuntu-Security-Notice-USN-7121-2.html" title="Size: 3.7 KB">Ubuntu Security Notice USN-7121-2</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-20/" title="15:50:18 UTC">Nov 20, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7121-2 - Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/kernel">kernel</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182709/USN-7121-2.txt" title="Size: 3.7 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182709/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182709/Ubuntu-Security-Notice-USN-7121-2.html">View</span></a></dd> </dl> <dl id="F182708" class="file"> <dt><a class="ico text-plain" href="/files/182708/Ubuntu-Security-Notice-USN-7120-2.html" title="Size: 2.8 KB">Ubuntu Security Notice USN-7120-2</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-20/" title="15:50:06 UTC">Nov 20, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7120-2 - Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/kernel">kernel</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182708/USN-7120-2.txt" title="Size: 2.8 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182708/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182708/Ubuntu-Security-Notice-USN-7120-2.html">View</span></a></dd> </dl> <dl id="F182707" class="file"> <dt><a class="ico text-plain" href="/files/182707/Ubuntu-Security-Notice-USN-7122-1.html" title="Size: 2.1 KB">Ubuntu Security Notice USN-7122-1</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-20/" title="15:49:45 UTC">Nov 20, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7122-1 - A security issue was discovered in the Linux kernel. An attacker could possibly use this to compromise the system.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/kernel">kernel</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182707/USN-7122-1.txt" title="Size: 2.1 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182707/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182707/Ubuntu-Security-Notice-USN-7122-1.html">View</span></a></dd> </dl> <dl id="F182706" class="file"> <dt><a class="ico text-plain" href="/files/182706/Ubuntu-Security-Notice-USN-7121-1.html" title="Size: 7.2 KB">Ubuntu Security Notice USN-7121-1</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-20/" title="15:49:33 UTC">Nov 20, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7121-1 - Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/kernel">kernel</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182706/USN-7121-1.txt" title="Size: 7.2 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182706/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182706/Ubuntu-Security-Notice-USN-7121-1.html">View</span></a></dd> </dl> <dl id="F182705" class="file"> <dt><a class="ico text-plain" href="/files/182705/Ubuntu-Security-Notice-USN-7120-1.html" title="Size: 5.9 KB">Ubuntu Security Notice USN-7120-1</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-20/" title="15:49:20 UTC">Nov 20, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7120-1 - Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/kernel">kernel</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182705/USN-7120-1.txt" title="Size: 5.9 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182705/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182705/Ubuntu-Security-Notice-USN-7120-1.html">View</span></a></dd> </dl> <dl id="F182704" class="file"> <dt><a class="ico text-plain" href="/files/182704/Ubuntu-Security-Notice-USN-7119-1.html" title="Size: 9.5 KB">Ubuntu Security Notice USN-7119-1</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-20/" title="15:49:05 UTC">Nov 20, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7119-1 - Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux kernel contained an integer overflow vulnerability. A local attacker could use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/denial_of_service">denial of service</a>, <a href="/files/tags/overflow">overflow</a>, <a href="/files/tags/kernel">kernel</a>, <a href="/files/tags/local">local</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182704/USN-7119-1.txt" title="Size: 9.5 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182704/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182704/Ubuntu-Security-Notice-USN-7119-1.html">View</span></a></dd> </dl> <dl id="F182703" class="file"> <dt><a class="ico text-plain" href="/files/182703/Ubuntu-Security-Notice-USN-7089-7.html" title="Size: 10.8 KB">Ubuntu Security Notice USN-7089-7</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-20/" title="15:48:53 UTC">Nov 20, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7089-7 - Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/denial_of_service">denial of service</a>, <a href="/files/tags/kernel">kernel</a>, <a href="/files/tags/local">local</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182703/USN-7089-7.txt" title="Size: 10.8 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182703/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182703/Ubuntu-Security-Notice-USN-7089-7.html">View</span></a></dd> </dl> <dl id="F182702" class="file"> <dt><a class="ico text-plain" href="/files/182702/Ubuntu-Security-Notice-USN-7117-1.html" title="Size: 3.6 KB">Ubuntu Security Notice USN-7117-1</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-20/" title="15:48:29 UTC">Nov 20, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7117-1 - Qualys discovered that needrestart passed unsanitized data to a library which expects safe input. A local attacker could possibly use this issue to execute arbitrary code as root. Qualys discovered that the library libmodule-scandeps-perl incorrectly parsed perl code. This could allow a local attacker to execute arbitrary shell commands.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/arbitrary">arbitrary</a>, <a href="/files/tags/shell">shell</a>, <a href="/files/tags/local">local</a>, <a href="/files/tags/root">root</a>, <a href="/files/tags/perl">perl</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182702/USN-7117-1.txt" title="Size: 3.6 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182702/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182702/Ubuntu-Security-Notice-USN-7117-1.html">View</span></a></dd> </dl> <dl id="F182701" class="file"> <dt><a class="ico text-plain" href="/files/182701/Ubuntu-Security-Notice-USN-7115-1.html" title="Size: 1.8 KB">Ubuntu Security Notice USN-7115-1</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-20/" title="15:48:13 UTC">Nov 20, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7115-1 - It was discovered that Waitress could process follow up requests when receiving a specially crafted message. An attacker could use this issue to have the server process inconsistent client requests. Dylan Jay discovered that Waitress could be lead to write to an unexisting socket after closing the remote connection. An attacker could use this issue to increase resource utilization leading to a denial of service.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/denial_of_service">denial of service</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182701/USN-7115-1.txt" title="Size: 1.8 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182701/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182701/Ubuntu-Security-Notice-USN-7115-1.html">View</span></a></dd> </dl> <dl id="F182700" class="file"> <dt><a class="ico application-x-zip" href="/files/182700/WordPress-Really-Simple-Security-Authentication-Bypass.html" title="Size: 6.6 KB">WordPress Really Simple Security Authentication Bypass</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-19/" title="15:43:03 UTC">Nov 19, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/13439/" class="person">Antonio Francesco Sardella</a> | Site <a href="https://github.com/m3ssap0/wordpress-really-simple-security-authn-bypass-exploit">github.com</a></dd> <dd class="detail"><p>WordPress Really Simple Security plugin versions prior to 9.1.2 proof of concept authentication bypass exploit.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/proof_of_concept">proof of concept</a>, <a href="/files/tags/bypass">bypass</a></dd> <dd class="act-links"><a href="/files/download/182700/wprss-bypass.zip" title="Size: 6.6 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182700/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182700/WordPress-Really-Simple-Security-Authentication-Bypass.html">View</span></a></dd> </dl> <dl id="F182699" class="file"> <dt><a class="ico application-x-zip" href="/files/182699/Palo-Alto-PAN-OS-Authentication-Bypass-Remote-Command-Execution.html" title="Size: 2.4 KB">Palo Alto PAN-OS Authentication Bypass / Remote Command Execution</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-19/" title="15:37:59 UTC">Nov 19, 2024</a></dd> <dd class="refer">Site <a href="https://github.com/Sachinart/CVE-2024-0012-POC">github.com</a></dd> <dd class="detail"><p>Proof of concept code to exploit an authentication bypass in Palo Alto's PAN-OS that is coupled with remote command execution.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/proof_of_concept">proof of concept</a></dd> <dd class="act-links"><a href="/files/download/182699/CVE-2024-0012-POC-main.zip" title="Size: 2.4 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182699/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182699/Palo-Alto-PAN-OS-Authentication-Bypass-Remote-Command-Execution.html">View</span></a></dd> </dl> <dl id="F182698" class="file"> <dt><a class="ico text-plain" href="/files/182698/Ubuntu-Security-Notice-USN-7116-1.html" title="Size: 2 KB">Ubuntu Security Notice USN-7116-1</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-19/" title="15:32:39 UTC">Nov 19, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7116-1 - It was discovered that Python incorrectly handled quoting path names when using the venv module. A local attacker able to control virtual environments could possibly use this issue to execute arbitrary code when the virtual environment is activated.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/arbitrary">arbitrary</a>, <a href="/files/tags/local">local</a>, <a href="/files/tags/python">python</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182698/USN-7116-1.txt" title="Size: 2 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182698/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182698/Ubuntu-Security-Notice-USN-7116-1.html">View</span></a></dd> </dl> <dl id="F182697" class="file"> <dt><a class="ico text-plain" href="/files/182697/Ubuntu-Security-Notice-USN-7015-5.html" title="Size: 3.6 KB">Ubuntu Security Notice USN-7015-5</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-19/" title="15:32:22 UTC">Nov 19, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7015-5 - USN-7015-1 fixed several vulnerabilities in Python. This update provides the corresponding update for CVE-2024-6232 and CVE-2024-6923 for python2.7 in Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. It was discovered that the Python email module incorrectly parsed email addresses that contain special characters. A remote attacker could possibly use this issue to bypass certain protection mechanisms. It was discovered that Python allowed excessive backtracking while parsing certain tarfile headers. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. It was discovered that the Python email module incorrectly quoted newlines for email headers. A remote attacker could possibly use this issue to perform header injection. It was discovered that the Python http.cookies module incorrectly handled parsing cookies that contained backslashes for quoted characters. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. It was discovered that the Python zipfile module incorrectly handled certain malformed zip files. A remote attacker could possibly use this issue to cause Python to stop responding, resulting in a denial of service.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/web">web</a>, <a href="/files/tags/denial_of_service">denial of service</a>, <a href="/files/tags/vulnerability">vulnerability</a>, <a href="/files/tags/python">python</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182697/USN-7015-5.txt" title="Size: 3.6 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182697/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182697/Ubuntu-Security-Notice-USN-7015-5.html">View</span></a></dd> </dl> <dl id="F182696" class="file"> <dt><a class="ico text-plain" href="/files/182696/Ubuntu-Security-Notice-USN-7114-1.html" title="Size: 2.1 KB">Ubuntu Security Notice USN-7114-1</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-19/" title="15:32:11 UTC">Nov 19, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7114-1 - It was discovered that Glib incorrectly handled certain trailing characters. An attacker could possibly use this issue to cause a crash or other undefined behavior.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182696/USN-7114-1.txt" title="Size: 2.1 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182696/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182696/Ubuntu-Security-Notice-USN-7114-1.html">View</span></a></dd> </dl> <dl id="F182695" class="file"> <dt><a class="ico text-plain" href="/files/182695/Ubuntu-Security-Notice-USN-7104-1.html" title="Size: 1.8 KB">Ubuntu Security Notice USN-7104-1</a></dt> <dd class="datetime">Posted <a href="/files/date/2024-11-19/" title="15:31:57 UTC">Nov 19, 2024</a></dd> <dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd> <dd class="detail"><p>Ubuntu Security Notice 7104-1 - It was discovered that curl could overwrite the HSTS expiry of the parent domain with the subdomain's HSTS entry. This could lead to curl switching back to insecure HTTP earlier than otherwise intended, resulting in information exposure.</p></dd> <dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/web">web</a></dd> <dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd> <dd class="act-links"><a href="/files/download/182695/USN-7104-1.txt" title="Size: 1.8 KB" rel="nofollow">Download</a> | <a href="/files/favorite/182695/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182695/Ubuntu-Security-Notice-USN-7104-1.html">View</span></a></dd> </dl> </div> <a id="files-home-next" href="/files/page2/" style="float:right; margin:10px 0;">View Older Files →</a> </div> </div> <div id="adblock"> </div> <div id="mn"> <div class="mn-like-us"> <ul> <li><a href="https://twitter.com/packet_storm"><img src="https://packetstatic.com/img1514015884/s_twitter.png" width="24" height="24" alt="Follow on Twitter" /> Follow us on Twitter</a></li> <li><a href="https://www.facebook.com/packetstormfeed"><img src="https://packetstatic.com/img1514015884/s_facebook.png" width="24" height="24" alt="Follow on Facebook" /> Follow us on Facebook</a></li> <li><a href="/feeds"><img src="https://packetstatic.com/img1514015884/s_rss.png" width="24" height="24" alt="View RSS Feeds" /> Subscribe to an RSS Feed</a></li> </ul> </div> <div id="news-home"> <h2>Recent News</h2><a href="https://rss.packetstormsecurity.com/news/" class="rss-home"><img src="https://packetstatic.com/img1514015884/bt_rss.gif" width="16" height="16" alt="News RSS Feed" /></a><br /> <dl id="N36627" class="news first"> <dt><a href="/news/view/36627/Russian-Women-Stepping-Up-For-Cybercrime-Outfits.html">Russian Women Stepping Up For Cybercrime Outfits</a></dt> <dd class="datetime">Posted <a href="/news/date/2024-11-21/" title="15:31:07 UTC">Nov 21, 2024</a></dd> <dd class="posted-by"></dd> <dd class="detail sd"><p></p></dd> <dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/russia">russia</a>, <a href="/news/tags/cybercrime">cybercrime</a>, <a href="/news/tags/cyberwar">cyberwar</a></dd> <dd class="act-links"><a href="/news/favorite/36627/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.scworld.com/news/russian-women-stepping-up-for-cybercrime-outfits">View</a> </dd> </dl> <dl id="N36626" class="news"> <dt><a href="/news/view/36626/Five-Scattered-Spider-Suspects-Indicted-For-Phishing-And-Heists.html">Five Scattered Spider Suspects Indicted For Phishing And Heists</a></dt> <dd class="datetime">Posted <a href="/news/date/2024-11-21/" title="15:30:55 UTC">Nov 21, 2024</a></dd> <dd class="posted-by"></dd> <dd class="detail sd"><p></p></dd> <dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/hacker">hacker</a>, <a href="/news/tags/cybercrime">cybercrime</a>, <a href="/news/tags/phish">phish</a>, <a href="/news/tags/cryptography">cryptography</a></dd> <dd class="act-links"><a href="/news/favorite/36626/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.theregister.com/2024/11/21/scattered_spider_suspects/">View</a> </dd> </dl> <dl id="N36625" class="news"> <dt><a href="/news/view/36625/Put-Your-Username-And-Passwords-In-Your-Will-Advises-Japans-Government.html">Put Your Username And Passwords In Your Will, Advises Japan's Government</a></dt> <dd class="datetime">Posted <a href="/news/date/2024-11-21/" title="15:30:51 UTC">Nov 21, 2024</a></dd> <dd class="posted-by"></dd> <dd class="detail sd"><p></p></dd> <dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/government">government</a>, <a href="/news/tags/password">password</a>, <a href="/news/tags/japan">japan</a></dd> <dd class="act-links"><a href="/news/favorite/36625/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.theregister.com/2024/11/21/japan_digital_end_of_life/">View</a> </dd> </dl> <dl id="N36620" class="news"> <dt><a href="/news/view/36620/CISA-Director-Jen-Easterly-To-Step-Down-Jan.-20.html">CISA Director Jen Easterly To Step Down Jan. 20</a></dt> <dd class="datetime">Posted <a href="/news/date/2024-11-20/" title="15:39:02 UTC">Nov 20, 2024</a></dd> <dd class="posted-by"></dd> <dd class="detail sd"><p></p></dd> <dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/government">government</a>, <a href="/news/tags/usa">usa</a></dd> <dd class="act-links"><a href="/news/favorite/36620/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.scworld.com/news/cisa-director-jen-easterly-will-step-down-jan-20-security-community-reacts">View</a> </dd> </dl> <dl id="N36619" class="news"> <dt><a href="/news/view/36619/Equinox-Notifies-21-000-Patients-And-Staff-Of-Data-Theft.html">Equinox Notifies 21,000 Patients And Staff Of Data Theft</a></dt> <dd class="datetime">Posted <a href="/news/date/2024-11-20/" title="15:39:00 UTC">Nov 20, 2024</a></dd> <dd class="posted-by"></dd> <dd class="detail sd"><p></p></dd> <dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/hacker">hacker</a>, <a href="/news/tags/privacy">privacy</a>, <a href="/news/tags/data_loss">data loss</a></dd> <dd class="act-links"><a href="/news/favorite/36619/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.theregister.com/2024/11/20/equinox_patients_employees_data/">View</a> </dd> </dl> <dl id="N36618" class="news"> <dt><a href="/news/view/36618/D-Link-Tells-Users-To-Trash-Old-VPN-Routers-Due-To-Bug.html">D-Link Tells Users To Trash Old VPN Routers Due To Bug</a></dt> <dd class="datetime">Posted <a href="/news/date/2024-11-20/" title="15:38:58 UTC">Nov 20, 2024</a></dd> <dd class="posted-by"></dd> <dd class="detail sd"><p></p></dd> <dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/flaw">flaw</a>, <a href="/news/tags/cisco">cisco</a></dd> <dd class="act-links"><a href="/news/favorite/36618/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.theregister.com/2024/11/20/dlink_rip_replace_router/">View</a> </dd> </dl> <dl id="N36617" class="news"> <dt><a href="/news/view/36617/Helldown-Ransomware-Evolves-To-Target-VMware-Systems-Via-Linux.html">Helldown Ransomware Evolves To Target VMware Systems Via Linux</a></dt> <dd class="datetime">Posted <a href="/news/date/2024-11-20/" title="15:38:55 UTC">Nov 20, 2024</a></dd> <dd class="posted-by"></dd> <dd class="detail sd"><p></p></dd> <dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/malware">malware</a>, <a href="/news/tags/linux">linux</a>, <a href="/news/tags/flaw">flaw</a></dd> <dd class="act-links"><a href="/news/favorite/36617/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.scworld.com/news/helldown-evolves-to-target-vmware-systems-via-linux">View</a> </dd> </dl> <dl id="N36616" class="news"> <dt><a href="/news/view/36616/Apple-Confirms-Zero-Day-Attacks-Hitting-macOS-Systems.html">Apple Confirms Zero Day Attacks Hitting macOS Systems</a></dt> <dd class="datetime">Posted <a href="/news/date/2024-11-20/" title="15:38:42 UTC">Nov 20, 2024</a></dd> <dd class="posted-by"></dd> <dd class="detail sd"><p></p></dd> <dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/flaw">flaw</a>, <a href="/news/tags/apple">apple</a>, <a href="/news/tags/zero_day">zero day</a></dd> <dd class="act-links"><a href="/news/favorite/36616/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.securityweek.com/apple-confirms-zero-day-attacks-hitting-intel-based-macs/">View</a> </dd> </dl> <dl id="N36615" class="news"> <dt><a href="/news/view/36615/Oracle-Patches-Exploited-Agile-PLM-Zero-Day.html">Oracle Patches Exploited Agile PLM Zero-Day</a></dt> <dd class="datetime">Posted <a href="/news/date/2024-11-20/" title="15:38:36 UTC">Nov 20, 2024</a></dd> <dd class="posted-by"></dd> <dd class="detail sd"><p></p></dd> <dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/flaw">flaw</a>, <a href="/news/tags/patch">patch</a>, <a href="/news/tags/oracle">oracle</a>, <a href="/news/tags/zero_day">zero day</a></dd> <dd class="act-links"><a href="/news/favorite/36615/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.securityweek.com/oracle-patches-exploited-agile-plm-zero-day/">View</a> </dd> </dl> <dl id="N36614" class="news"> <dt><a href="/news/view/36614/Bitcoin-Bursts-Past-94-000-For-The-First-Time.html">Bitcoin Bursts Past $94,000 For The First Time</a></dt> <dd class="datetime">Posted <a href="/news/date/2024-11-20/" title="15:38:31 UTC">Nov 20, 2024</a></dd> <dd class="posted-by"></dd> <dd class="detail sd"><p></p></dd> <dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/cryptography">cryptography</a></dd> <dd class="act-links"><a href="/news/favorite/36614/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.reuters.com/technology/bitcoin-breaches-94000-first-time-2024-11-20/">View</a> </dd> </dl> <a href="/news/" style="float:right; margin:10px 0;">View More News →</a> </div> <div> <form id="cal" action="/files/cal/" method="get"> <h2>File Archive:</h2><h3>November 2024</h3> <button id="cal-prev" name="cal-prev" type="button" value="2024-11"><span><</span></button><ul class="dotw"><li>Su</li><li>Mo</li><li>Tu</li><li>We</li><li>Th</li><li>Fr</li><li>Sa</li></ul> <ul><li></li><li></li><li></li><li></li><li></li><li class="med"><a href="/files/date/2024-11-01/">1</a><div class="stats"><div class="point"></div><div class="date">Nov 1st</div><div class="count">30 Files</div></div></li><li class="none"><a href="/files/date/2024-11-02/">2</a><div class="stats"><div class="point"></div><div class="date">Nov 2nd</div><div class="count">0 Files</div></div></li></ul> <ul><li class="none"><a href="/files/date/2024-11-03/">3</a><div class="stats"><div class="point"></div><div class="date">Nov 3rd</div><div class="count">0 Files</div></div></li><li class="low"><a href="/files/date/2024-11-04/">4</a><div class="stats"><div class="point"></div><div class="date">Nov 4th</div><div class="count">12 Files</div></div></li><li class="med"><a href="/files/date/2024-11-05/">5</a><div class="stats"><div class="point"></div><div class="date">Nov 5th</div><div class="count">44 Files</div></div></li><li class="med"><a href="/files/date/2024-11-06/">6</a><div class="stats"><div class="point"></div><div class="date">Nov 6th</div><div class="count">18 Files</div></div></li><li class="low"><a href="/files/date/2024-11-07/">7</a><div class="stats"><div class="point"></div><div class="date">Nov 7th</div><div class="count">9 Files</div></div></li><li class="low"><a href="/files/date/2024-11-08/">8</a><div class="stats"><div class="point"></div><div class="date">Nov 8th</div><div class="count">8 Files</div></div></li><li class="low"><a href="/files/date/2024-11-09/">9</a><div class="stats"><div class="point"></div><div class="date">Nov 9th</div><div class="count">3 Files</div></div></li></ul> <ul><li class="none"><a href="/files/date/2024-11-10/">10</a><div class="stats"><div class="point"></div><div class="date">Nov 10th</div><div class="count">0 Files</div></div></li><li class="low"><a href="/files/date/2024-11-11/">11</a><div class="stats"><div class="point"></div><div class="date">Nov 11th</div><div class="count">14 Files</div></div></li><li class="med"><a href="/files/date/2024-11-12/">12</a><div class="stats"><div class="point"></div><div class="date">Nov 12th</div><div class="count">20 Files</div></div></li><li class="high"><a href="/files/date/2024-11-13/">13</a><div class="stats"><div class="point"></div><div class="date">Nov 13th</div><div class="count">63 Files</div></div></li><li class="med"><a href="/files/date/2024-11-14/">14</a><div class="stats"><div class="point"></div><div class="date">Nov 14th</div><div class="count">18 Files</div></div></li><li class="low"><a href="/files/date/2024-11-15/">15</a><div class="stats"><div class="point"></div><div class="date">Nov 15th</div><div class="count">8 Files</div></div></li><li class="none"><a href="/files/date/2024-11-16/">16</a><div class="stats"><div class="point"></div><div class="date">Nov 16th</div><div class="count">0 Files</div></div></li></ul> <ul><li class="none"><a href="/files/date/2024-11-17/">17</a><div class="stats"><div class="point"></div><div class="date">Nov 17th</div><div class="count">0 Files</div></div></li><li class="med"><a href="/files/date/2024-11-18/">18</a><div class="stats"><div class="point"></div><div class="date">Nov 18th</div><div class="count">18 Files</div></div></li><li class="low"><a href="/files/date/2024-11-19/">19</a><div class="stats"><div class="point"></div><div class="date">Nov 19th</div><div class="count">7 Files</div></div></li><li class="low"><a href="/files/date/2024-11-20/">20</a><div class="stats"><div class="point"></div><div class="date">Nov 20th</div><div class="count">13 Files</div></div></li><li class="low"><a href="/files/date/2024-11-21/">21</a><div class="stats"><div class="point"></div><div class="date">Nov 21st</div><div class="count">6 Files</div></div></li><li class="none today"><a href="/files/date/2024-11-22/">22</a><div class="stats"><div class="point"></div><div class="date">Nov 22nd</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-11-23/">23</a><div class="stats"><div class="point"></div><div class="date">Nov 23rd</div><div class="count">0 Files</div></div></li></ul> <ul><li class="none"><a href="/files/date/2024-11-24/">24</a><div class="stats"><div class="point"></div><div class="date">Nov 24th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-11-25/">25</a><div class="stats"><div class="point"></div><div class="date">Nov 25th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-11-26/">26</a><div class="stats"><div class="point"></div><div class="date">Nov 26th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-11-27/">27</a><div class="stats"><div class="point"></div><div class="date">Nov 27th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-11-28/">28</a><div class="stats"><div class="point"></div><div class="date">Nov 28th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-11-29/">29</a><div class="stats"><div class="point"></div><div class="date">Nov 29th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-11-30/">30</a><div class="stats"><div class="point"></div><div class="date">Nov 30th</div><div class="count">0 Files</div></div></li></ul> </form></div> <div id="mn-top-author" class="top-ten"> <h2>Top Authors In Last 30 Days</h2> <ul> <li><a href="/files/authors/4676">Red Hat</a> <span>240 files</span></li> <li><a href="/files/authors/3695">Ubuntu</a> <span>63 files</span></li> <li><a href="/files/authors/2821">Debian</a> <span>21 files</span></li> <li><a href="/files/authors/5960">LiquidWorm</a> <span>14 files</span></li> <li><a href="/files/authors/2397">Apple</a> <span>9 files</span></li> <li><a href="/files/authors/3417">Gentoo</a> <span>8 files</span></li> <li><a href="/files/authors/17574">Alter Prime</a> <span>3 files</span></li> <li><a href="/files/authors/17258">EQSTLab</a> <span>2 files</span></li> <li><a href="/files/authors/16023">Yehia Elghaly</a> <span>2 files</span></li> <li><a href="/files/authors/11740">Pierre Kim</a> <span>2 files</span></li> </ul> </div> <div id="mn-tag-file"><h2>File Tags</h2><ul><li><a href="/files/tags/activex/">ActiveX</a> <span>(933)</span></li><li><a href="/files/tags/advisory/">Advisory</a> <span>(87,616)</span></li><li><a href="/files/tags/arbitrary/">Arbitrary</a> <span>(17,208)</span></li><li><a href="/files/tags/bbs/">BBS</a> <span>(2,859)</span></li><li><a href="/files/tags/bypass/">Bypass</a> <span>(1,937)</span></li><li><a href="/files/tags/cgi/">CGI</a> <span>(1,051)</span></li><li><a href="/files/tags/code_execution/">Code Execution</a> <span>(7,994)</span></li><li><a href="/files/tags/conference/">Conference</a> <span>(693)</span></li><li><a href="/files/tags/cracker/">Cracker</a> <span>(845)</span></li><li><a href="/files/tags/csrf/">CSRF</a> <span>(3,440)</span></li><li><a href="/files/tags/denial_of_service/">DoS</a> <span>(25,508)</span></li><li><a href="/files/tags/encryption/">Encryption</a> <span>(2,397)</span></li><li><a href="/files/tags/exploit/">Exploit</a> <span>(54,501)</span></li><li><a href="/files/tags/file_inclusion/">File Inclusion</a> <span>(4,281)</span></li><li><a href="/files/tags/file_upload/">File Upload</a> <span>(1,029)</span></li><li><a href="/files/tags/firewall/">Firewall</a> <span>(822)</span></li><li><a href="/files/tags/info_disclosure/">Info Disclosure</a> <span>(2,941)</span></li><li><a href="/files/tags/intrusion_detection/">Intrusion Detection</a> <span>(925)</span></li><li><a href="/files/tags/java/">Java</a> <span>(3,166)</span></li><li><a href="/files/tags/javascript/">JavaScript</a> <span>(913)</span></li><li><a href="/files/tags/kernel/">Kernel</a> <span>(7,378)</span></li><li><a href="/files/tags/local/">Local</a> <span>(14,902)</span></li><li><a href="/files/tags/magazine/">Magazine</a> <span>(587)</span></li><li><a href="/files/tags/overflow/">Overflow</a> <span>(13,282)</span></li><li><a href="/files/tags/perl/">Perl</a> <span>(1,439)</span></li><li><a href="/files/tags/php/">PHP</a> <span>(5,336)</span></li><li><a href="/files/tags/proof_of_concept/">Proof of Concept</a> <span>(2,425)</span></li><li><a href="/files/tags/protocol/">Protocol</a> <span>(3,761)</span></li><li><a href="/files/tags/python/">Python</a> <span>(1,683)</span></li><li><a href="/files/tags/remote/">Remote</a> <span>(32,003)</span></li><li><a href="/files/tags/root/">Root</a> <span>(3,679)</span></li><li><a href="/files/tags/rootkit/">Rootkit</a> <span>(531)</span></li><li><a href="/files/tags/ruby/">Ruby</a> <span>(647)</span></li><li><a href="/files/tags/scanner/">Scanner</a> <span>(1,664)</span></li><li><a href="/files/tags/tool/">Security Tool</a> <span>(8,073)</span></li><li><a href="/files/tags/shell/">Shell</a> <span>(3,331)</span></li><li><a href="/files/tags/shellcode/">Shellcode</a> <span>(1,219)</span></li><li><a href="/files/tags/sniffer/">Sniffer</a> <span>(906)</span></li><li><a href="/files/tags/spoof/">Spoof</a> <span>(2,320)</span></li><li><a href="/files/tags/sql_injection/">SQL Injection</a> <span>(16,754)</span></li><li><a href="/files/tags/tcp/">TCP</a> <span>(2,465)</span></li><li><a href="/files/tags/trojan/">Trojan</a> <span>(690)</span></li><li><a href="/files/tags/udp/">UDP</a> <span>(921)</span></li><li><a href="/files/tags/virus/">Virus</a> <span>(675)</span></li><li><a href="/files/tags/vulnerability/">Vulnerability</a> <span>(33,297)</span></li><li><a href="/files/tags/web/">Web</a> <span>(10,193)</span></li><li><a href="/files/tags/paper/">Whitepaper</a> <span>(3,786)</span></li><li><a href="/files/tags/x86/">x86</a> <span>(973)</span></li><li><a href="/files/tags/xss/">XSS</a> <span>(18,354)</span></li><li><a href="/files/tags/">Other</a></li></ul></div><div id="mn-arch-file"><h2>File Archives</h2><ul><li><a href="/files/date/2024-11/">November 2024</a></li><li><a href="/files/date/2024-10/">October 2024</a></li><li><a href="/files/date/2024-09/">September 2024</a></li><li><a href="/files/date/2024-08/">August 2024</a></li><li><a href="/files/date/2024-07/">July 2024</a></li><li><a href="/files/date/2024-06/">June 2024</a></li><li><a href="/files/date/2024-05/">May 2024</a></li><li><a href="/files/date/2024-04/">April 2024</a></li><li><a href="/files/date/2024-03/">March 2024</a></li><li><a href="/files/date/2024-02/">February 2024</a></li><li><a href="/files/date/2024-01/">January 2024</a></li><li><a href="/files/date/2023-12/">December 2023</a></li><li><a href="/files/date/">Older</a></li></ul></div><div id="mn-os-file"><h2>Systems</h2><ul><li><a href="/files/os/aix/">AIX</a> <span>(430)</span></li><li><a href="/files/os/apple/">Apple</a> <span>(2,126)</span></li><li><a href="/files/os/bsd/">BSD</a> <span>(378)</span></li><li><a href="/files/os/centos/">CentOS</a> <span>(61)</span></li><li><a href="/files/os/cisco/">Cisco</a> <span>(1,954)</span></li><li><a href="/files/os/debian/">Debian</a> <span>(7,168)</span></li><li><a href="/files/os/fedora/">Fedora</a> <span>(1,693)</span></li><li><a href="/files/os/freebsd/">FreeBSD</a> <span>(1,247)</span></li><li><a href="/files/os/gentoo/">Gentoo</a> <span>(4,607)</span></li><li><a href="/files/os/hpux/">HPUX</a> <span>(881)</span></li><li><a href="/files/os/ios/">iOS</a> <span>(393)</span></li><li><a href="/files/os/iphone/">iPhone</a> <span>(108)</span></li><li><a href="/files/os/irix/">IRIX</a> <span>(220)</span></li><li><a href="/files/os/juniper/">Juniper</a> <span>(71)</span></li><li><a href="/files/os/linux/">Linux</a> <span>(51,979)</span></li><li><a href="/files/os/osx/">Mac OS X</a> <span>(696)</span></li><li><a href="/files/os/mandriva/">Mandriva</a> <span>(3,105)</span></li><li><a href="/files/os/netbsd/">NetBSD</a> <span>(256)</span></li><li><a href="/files/os/openbsd/">OpenBSD</a> <span>(490)</span></li><li><a href="/files/os/redhat/">RedHat</a> <span>(17,344)</span></li><li><a href="/files/os/slackware/">Slackware</a> <span>(941)</span></li><li><a href="/files/os/solaris/">Solaris</a> <span>(1,615)</span></li><li><a href="/files/os/suse/">SUSE</a> <span>(1,444)</span></li><li><a href="/files/os/ubuntu/">Ubuntu</a> <span>(10,006)</span></li><li><a href="/files/os/unix/">UNIX</a> <span>(9,479)</span></li><li><a href="/files/os/unixware/">UnixWare</a> <span>(188)</span></li><li><a href="/files/os/windows/">Windows</a> <span>(6,785)</span></li><li><a href="/files/os/">Other</a></li></ul></div><div id="mn-tag-news"><h2>News Tags</h2><ul><li><a href="/news/tags/zero_day/">0 Day</a> <span>(318)</span></li><li><a href="/news/tags/adobe/">Adobe</a> <span>(310)</span></li><li><a href="/news/tags/anonymous/">Anonymous</a> <span>(350)</span></li><li><a href="/news/tags/apple/">Apple</a> <span>(1,074)</span></li><li><a href="/news/tags/backdoor/">Backdoor</a> <span>(722)</span></li><li><a href="/news/tags/bank/">Bank</a> <span>(1,215)</span></li><li><a href="/news/tags/botnet/">Botnet</a> <span>(597)</span></li><li><a href="/news/tags/britain/">Britain</a> <span>(1,118)</span></li><li><a href="/news/tags/china/">China</a> <span>(965)</span></li><li><a href="/news/tags/cisco/">Cisco</a> <span>(220)</span></li><li><a href="/news/tags/conference/">Conference</a> <span>(329)</span></li><li><a href="/news/tags/cryptography/">Cryptography</a> <span>(1,668)</span></li><li><a href="/news/tags/cybercrime/">Cybercrime</a> <span>(2,174)</span></li><li><a href="/news/tags/cyberwar/">Cyberwar</a> <span>(1,978)</span></li><li><a href="/news/tags/data_loss/">Data Loss</a> <span>(4,054)</span></li><li><a href="/news/tags/database/">Database</a> <span>(227)</span></li><li><a href="/news/tags/denial_of_service/">DoS</a> <span>(566)</span></li><li><a href="/news/tags/email/">Email</a> <span>(523)</span></li><li><a href="/news/tags/facebook/">Facebook</a> <span>(836)</span></li><li><a href="/news/tags/fbi/">FBI</a> <span>(464)</span></li><li><a href="/news/tags/flaw/">Flaw</a> <span>(4,640)</span></li><li><a href="/news/tags/fraud/">Fraud</a> <span>(2,713)</span></li><li><a href="/news/tags/google/">Google</a> <span>(1,578)</span></li><li><a href="/news/tags/government/">Government</a> <span>(7,101)</span></li><li><a href="/news/tags/hacker/">Hacker</a> <span>(7,731)</span></li><li><a href="/news/tags/headline/">Headline</a> <span>(20,204)</span></li><li><a href="/news/tags/identity_theft/">Identity Theft</a> <span>(220)</span></li><li><a href="/news/tags/iran/">Iran</a> <span>(232)</span></li><li><a href="/news/tags/linux/">Linux</a> <span>(266)</span></li><li><a href="/news/tags/malware/">Malware</a> <span>(2,796)</span></li><li><a href="/news/tags/microsoft/">Microsoft</a> <span>(1,852)</span></li><li><a href="/news/tags/military/">Military</a> <span>(233)</span></li><li><a href="/news/tags/mozilla/">Mozilla</a> <span>(218)</span></li><li><a href="/news/tags/nsa/">NSA</a> <span>(678)</span></li><li><a href="/news/tags/password/">Password</a> <span>(804)</span></li><li><a href="/news/tags/patch/">Patch</a> <span>(1,038)</span></li><li><a href="/news/tags/phish/">Phish</a> <span>(389)</span></li><li><a href="/news/tags/phone/">Phone</a> <span>(1,948)</span></li><li><a href="/news/tags/privacy/">Privacy</a> <span>(4,847)</span></li><li><a href="/news/tags/russia/">Russia</a> <span>(1,084)</span></li><li><a href="/news/tags/scada/">Scada</a> <span>(210)</span></li><li><a href="/news/tags/scam/">Scam</a> <span>(274)</span></li><li><a href="/news/tags/science/">Science</a> <span>(535)</span></li><li><a href="/news/tags/social/">Social</a> <span>(474)</span></li><li><a href="/news/tags/space/">Space</a> <span>(260)</span></li><li><a href="/news/tags/spam/">Spam</a> <span>(380)</span></li><li><a href="/news/tags/spyware/">Spyware</a> <span>(1,623)</span></li><li><a href="/news/tags/terror/">Terror</a> <span>(411)</span></li><li><a href="/news/tags/trojan/">Trojan</a> <span>(321)</span></li><li><a href="/news/tags/twitter/">Twitter</a> <span>(404)</span></li><li><a href="/news/tags/usa/">USA</a> <span>(3,965)</span></li><li><a href="/news/tags/virus/">Virus</a> <span>(397)</span></li><li><a href="/news/tags/wireless/">Wireless</a> <span>(230)</span></li><li><a href="/news/tags/worm/">Worm</a> <span>(201)</span></li><li><a href="/news/tags/">Other</a></li></ul></div><div id="mn-arch-news"><h2>News Archives</h2><ul><li><a href="/news/date/2024-11/">November 2024</a></li><li><a href="/news/date/2024-10/">October 2024</a></li><li><a href="/news/date/2024-09/">September 2024</a></li><li><a href="/news/date/2024-08/">August 2024</a></li><li><a href="/news/date/2024-07/">July 2024</a></li><li><a href="/news/date/2024-06/">June 2024</a></li><li><a href="/news/date/2024-05/">May 2024</a></li><li><a href="/news/date/2024-04/">April 2024</a></li><li><a href="/news/date/2024-03/">March 2024</a></li><li><a href="/news/date/2024-02/">February 2024</a></li><li><a href="/news/date/2024-01/">January 2024</a></li><li><a href="/news/date/2023-12/">December 2023</a></li><li><a href="/news/date/">Older</a></li></ul></div> </div> </div> </div> <div id="f"> <div id="fc"> <div class="f-box" style="margin: 50px 0 0 0;"> <a href="/"><img src="https://packetstatic.com/img1514015884/ps_logo.png" width="218" alt="packet storm" /></a> <p class="copy">© 2024 Packet Storm. All rights reserved.</p> </div> <div class="f-box"> <dl> <dt>Site Links</dt> <dd><a href="/news/date/">News by Month</a></dd> <dd><a href="/news/tags/">News Tags</a></dd> <dd><a href="/files/date/">Files by Month</a></dd> <dd><a href="/files/tags/">File Tags</a></dd> <dd><a href="/files/directory/">File Directory</a></dd> </dl> </div> <div class="f-box"> <dl> <dt>About Us</dt> <dd><a href="/about/">History & Purpose</a></dd> <dd><a href="/contact/">Contact Information</a></dd> <dd><a href="/legal/tos.html">Terms of Service</a></dd> <dd><a href="/legal/privacy.html">Privacy Statement</a></dd> <dd><a href="/legal/copyright.html">Copyright Information</a></dd> </dl> </div> <div class="f-box"> <dl> <dt>Services</dt> <dd><a href="/services/">Security Services</a></dd> <dt style="margin-top:1.5em;">Hosting By</dt> <dd><a href="http://www.rokasecurity.com/">Rokasec</a></dd> </dl> </div> <div class="f-box"> <ul class="f-follow"> <li><a href="https://twitter.com/packet_storm"><img width="24" height="24" alt="Follow on Twitter" src="https://packetstatic.com/img1514015884/s_twitter.png" /> Follow us on Twitter</a></li> <li><a href="https://www.facebook.com/packetstormfeed"><img width="24" height="24" alt="Follow on Facebook" src="https://packetstatic.com/img1514015884/s_facebook.png" /> Follow us on Facebook</a></li> <li><a href="/feeds"><img width="24" height="24" alt="View RSS Feeds" src="https://packetstatic.com/img1514015884/s_rss.png" /> Subscribe to an RSS Feed</a></li> </ul> </div> </div> </div> <div id="o-box"><img src="https://packetstatic.com/img1514015884/o_close.png" alt="close" height="30" width="30" id="o-close" /><div id="o-main"></div></div> <script type="text/javascript"> var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-18885198-1']); _gaq.push (['_gat._anonymizeIp']); _gaq.push(['_setDomainName', '.packetstormsecurity.com']); _gaq.push(['_trackPageview']); (function() {var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.googleanalytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s);})(); </script><noscript><img src="https://ssl.google-analytics.com/__utm.gif?utmwv=1.3&utmn=2593578367&utmcs=ISO-8859-1&utmsr=31337x31337&utmsc=32-bit&utmul=en-us&utmje=0&utmfl=-&utmcn=1&utmdt=%u2248%20Packet%20Storm&utmhn=packetstormsecurity.com&utmr=-&utmp=%2F&utmac=UA-18885198-1&utmcc=__utma%3D32867617.2593578367.1732264796.1732264796.1732264796.1%3B%2B__utmz%3D32867617.1732264796.1.1.utmccn%3D(direct)%7Cutmcsr%3D(direct)%7Cutmcmd%3D(none)" width="2" height="2" alt="" /></noscript> <!-- Fri, 22 Nov 2024 08:39:56 GMT --> </body> </html>
Resolver
Resolver ASN
AS36692
Resolver IP
208.69.35.165
Resolver Network Name
Cisco OpenDNS, LLC
Report ID
20241122T083810Z_webconnectivity_AL_47394_n1_PqrloV4oWomzVe3Y
Platform
android
Software Name
ooniprobe-android-unattended (4.0.0)
Measurement Engine
ooniprobe-engine (3.23.0)