OK
https://packetstormsecurity.com/
Iceland
Country
Network
December 04, 2024, 07:57 AM UTC
Date & Time
Websites
Websites
Runtime: 2.2s
On December 04, 2024, 07:57 AM UTC, https://packetstormsecurity.com/ was accessible when tested on AS51896 in Iceland.

Failures

HTTP Experiment
null
DNS Experiment
null
Control
null

DNS Queries

Resolver:
45.134.88.121
Query:
IN A packetstormsecurity.com
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
198.84.60.198

TCP Connections

Connection to 198.84.60.198:443 succeeded.

HTTP Requests

URL
GET https://packetstormsecurity.com/
Response Headers
Cache-Control:
no-cache, no-store, private, must-revalidate, proxy-revalidate
Connection:
keep-alive
Content-Type:
text/html; charset=utf-8
Date:
Wed, 04 Dec 2024 07:57:10 GMT
Expires:
0
Server:
nginx
Set-Cookie:
P=0; expires=Fri, 5-May-1999 05:05:05 GMT; domain=.packetstormsecurity.com; path=/; HttpOnly; secure
Strict-Transport-Security:
max-age=3600
Vary:
Accept-Encoding
X-Content-Type-Options:
nosniff
X-Frame-Options:
SAMEORIGIN
X-Xss-Protection:
1; mode=block
Response Body
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-type" content="text/html;charset=utf-8" />
<title>Packet Storm</title>
<meta name="description" content="Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers" />
<meta name="keywords" content="security,exploit,advisory,whitepaper,xss,csrf,overflow,scanner,vulnerability" />
<link rel="shortcut icon" href="/img/pss.ico" />
<link rel="stylesheet" media="screen,print,handheld" href="https://packetstatic.com/css1651606189/pss.css" type="text/css" />
<!--[if lt ie 8]><link rel="stylesheet" type="text/css" href="https://packetstatic.com/css1651606189/ie.css" /><![endif]-->
<script type="text/javascript" src="https://packetstatic.com/js1651606189/pt.js"></script>
<script type="text/javascript" src="https://packetstatic.com/js1651606189/pss.js"></script>
<link rel="search" type="application/opensearchdescription+xml" href="https://packetstormsecurity.com/opensearch.xml" title="Packet Storm Site Search" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Headlines" href="https://rss.packetstormsecurity.com/news/" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Recent Files" href="https://rss.packetstormsecurity.com/files/" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Exploits" href="https://rss.packetstormsecurity.com/files/tags/exploit/" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Advisories" href="https://rss.packetstormsecurity.com/files/tags/advisory/" />
</head>
<body id="home">
<div id="t">
   <div id="tc">
      <a id="top" href="/"><img src="https://packetstatic.com/img1514015884/ps_logo.png" width="315" height="65" id="logo" alt="packet storm" /></a>
      <div id="slogan">what you don't know can hurt you
</div>
      <div id="account"><a href="https://packetstormsecurity.com/account/register/">Register</a> | <a href="https://packetstormsecurity.com/account/login/">Login</a></div>
      <div id="search">
        <form method="get" action="/search/"><input type="text" name="q" id="q" maxlength="120" value="Search &#8230;" /><button type="submit"></button><div id="q-tabs"><label for="s-files" class="on">Files</label><label for="s-news">News</label><label for="s-users">Users</label><label for="s-authors">Authors</label><input type="radio" value="files" name="s" id="s-files" /><input type="radio" value="news" name="s" id="s-news" /><input type="radio" value="users" name="s" id="s-users" /><input type="radio" value="authors" name="s" id="s-authors" /></div></form>
      </div>
   </div>
    <div id="tn"><div id="tnc">
        <a href="/" id="tn-home"><span>Home</span></a> <a href="/files/" id="tn-files"><span>Files</span></a> <a href="/news/" id="tn-news"><span>News</span></a> &[SERVICES_TAB]<a href="/about/" id="tn-about"><span>About</span></a> <a href="/contact/" id="tn-contact"><span>Contact</span></a> <a href="/submit/" id="tn-submit"><span>Add New</span></a>
    </div></div>
    <div id="tn2"></div>
</div>

<div id="c">

 <div id="cc">
     <div id="m">
    

    
    
     
    
    <div id="news-headline"><dl id="N36659" class="news first">
<dd class="detail sd"><a href="/news/view/36659/Apple-Illegally-Surveilled-and-Censored-Workers-Employee-Lawsuit-Says.html"><img src="https://packetstatic.com/art/t/timcook-420.jpg" width="420" alt="" /></a></dd>
<dt><a href="/news/view/36659/Apple-Illegally-Surveilled-and-Censored-Workers-Employee-Lawsuit-Says.html">Apple Illegally Surveilled and Censored Workers, Employee Lawsuit Says</a></dt>
</dl>
<dl id="N36658" class="news">
<dd class="detail sd"><a href="/news/view/36658/Severity-Of-Risk-Facing-The-UK-Is-Widely-Underestimated.html"><img src="https://packetstatic.com/art/t/thebritish-100.jpg" width="100" alt="" /></a></dd>
<dt><a href="/news/view/36658/Severity-Of-Risk-Facing-The-UK-Is-Widely-Underestimated.html">Severity Of Risk Facing The UK Is Widely Underestimated </a></dt>
</dl>
<dl id="N36657" class="news">
<dd class="detail sd"><a href="/news/view/36657/Hackers-Stole-1.49-Billion-In-Cryptocurrency-To-Date-In-2024.html"><img src="https://packetstatic.com/art/b/binary-100.jpg" width="100" alt="" /></a></dd>
<dt><a href="/news/view/36657/Hackers-Stole-1.49-Billion-In-Cryptocurrency-To-Date-In-2024.html">Hackers Stole &#36;1.49 Billion In Cryptocurrency To Date In 2024</a></dt>
</dl>
<dl id="N36656" class="news">
<dd class="detail sd"><a href="/news/view/36656/760k-Employee-Records-From-Major-Firms-Leaked-Online.html"><img src="https://packetstatic.com/art/f/facepalm-100.jpg" width="100" alt="" /></a></dd>
<dt><a href="/news/view/36656/760k-Employee-Records-From-Major-Firms-Leaked-Online.html">760k Employee Records From Major Firms Leaked Online</a></dt>
</dl>
</div><div id="files-home">
<h2>Recent Files</h2><a href="https://rss.packetstormsecurity.com/files/" class="rss-home"><img src="https://packetstatic.com/img1514015884/bt_rss.gif" width="16" height="16" alt="Files RSS Feed" /></a>
<div class="tab-box"><div id="lv" title="Toggle List View"></div><ul class="tabs"><li class="tab on"><a href="/files/">All</a></li><li class="tab"><a href="/files/tags/exploit/">Exploits</a></li><li class="tab"><a href="/files/tags/advisory/">Advisories</a></li><li class="tab"><a href="/files/tags/tool/">Tools</a></li><li class="tab"><a href="/files/tags/paper/">Whitepapers</a></li><li class="tab"><a href="/files/tags/">Other</a></li></ul><div class="tabs-cut"></div></div>
<div id="files-home-list">
<dl id="F182937" class="file first">
<dt><a class="ico text-plain" href="/files/182937/Acronis-Cyber-Protect-Backup-Remote-Code-Execution.html" title="Size: 21.1 KB">Acronis Cyber Protect/Backup Remote Code Execution</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:41:44 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/16423/" class="person">h00die-gr3y</a> | Site <a href="http://www.metasploit.com">metasploit.com</a></dd>
<dd class="detail"><p>The Acronis Cyber Protect appliance, in its default configuration, allows the anonymous registration of new protect/backup agents on new endpoints. This API endpoint also generates bearer tokens which the agent then uses to authenticate to the appliance. As the management web console is running on the same port as the API for the agents, this bearer token is also valid for any actions on the web console. This allows an attacker with network access to the appliance to start the registration of a new agent, retrieve a bearer token that provides admin access to the available functions in the web console. The web console contains multiple possibilities to execute arbitrary commands on both the agents (e.g., via PreCommands for a backup) and also the appliance (e.g., via a Validation job on the agent of the appliance). These options can easily be set with the provided bearer token, which leads to a complete compromise of all agents and the appliance itself.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/web">web</a>, <a href="/files/tags/arbitrary">arbitrary</a></dd>
<dd class="act-links"><a href="/files/download/182937/acronis_cyber_protect_unauth_rce_cve_2022_3405.rb.txt" title="Size: 21.1 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182937/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182937/Acronis-Cyber-Protect-Backup-Remote-Code-Execution.html">View</span></a></dd>
</dl>
<dl id="F182936" class="file">
<dt><a class="ico text-plain" href="/files/182936/Fortinet-FortiManager-Unauthenticated-Remote-Code-Execution.html" title="Size: 12.3 KB">Fortinet FortiManager Unauthenticated Remote Code Execution</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:39:11 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/16759/" class="person">sfewer-r7</a> | Site <a href="http://www.metasploit.com">metasploit.com</a></dd>
<dd class="detail"><p>This Metasploit module exploits a missing authentication vulnerability affecting FortiManager and FortiManager Cloud devices to achieve unauthenticated RCE with root privileges. The vulnerable FortiManager versions are 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.7, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, and 6.2.0 through 6.2.12. The vulnerable FortiManager Cloud versions are 7.4.1 through 7.4.4, 7.2.1 through 7.2.7, 7.0.1 through 7.0.12, and 6.4 (all versions).</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/root">root</a></dd>
<dd class="act-links"><a href="/files/download/182936/fortimanager_rce_cve_2024_47575.rb.txt" title="Size: 12.3 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182936/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182936/Fortinet-FortiManager-Unauthenticated-Remote-Code-Execution.html">View</span></a></dd>
</dl>
<dl id="F182935" class="file">
<dt><a class="ico text-plain" href="/files/182935/Asterisk-AMI-Originate-Authenticated-Remote-Code-Execution.html" title="Size: 7.6 KB">Asterisk AMI Originate Authenticated Remote Code Execution</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:37:51 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/7166/" class="person">h00die</a>, <a href="/files/author/8984/" class="person">Brendan Coles</a> | Site <a href="http://www.metasploit.com">metasploit.com</a></dd>
<dd class="detail"><p>On Asterisk, prior to versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with write&#61;originate may change all configuration files in the /etc/asterisk/ directory. Writing a new extension can be created which performs a system command to achieve RCE as the asterisk service user (typically asterisk). Default parking lot in FreePBX is called &quot;Default lot&quot; on the website interface, however its actually parkedcalls. Tested against Asterisk 19.8.0 and 18.16.0 on Freepbx SNG7-PBX16-64bit-2302-1.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a></dd>
<dd class="act-links"><a href="/files/download/182935/asterisk_ami_originate_auth_rce.rb.txt" title="Size: 7.6 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182935/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182935/Asterisk-AMI-Originate-Authenticated-Remote-Code-Execution.html">View</span></a></dd>
</dl>
<dl id="F182934" class="file">
<dt><a class="ico text-plain" href="/files/182934/Debian-Security-Advisory-5823-1.html" title="Size: 2.4 KB">Debian Security Advisory 5823-1</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:36:52 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/2821/" class="company">Debian</a> | Site <a href="http://www.debian.org/security">debian.org</a></dd>
<dd class="detail"><p>Debian Linux Security Advisory 5823-1 - The following vulnerabilities have been discovered in the WebKitGTK web engine. Clement Lecigne and Benoit Sevens discovered that processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems. Clement Lecigne and Benoit Sevens discovered that processing maliciously crafted web content may lead to a cross site scripting attack. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/web">web</a>, <a href="/files/tags/arbitrary">arbitrary</a>, <a href="/files/tags/vulnerability">vulnerability</a>, <a href="/files/tags/code_execution">code execution</a>, <a href="/files/tags/xss">xss</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/debian">debian</a>, <a href="/files/os/apple">apple</a></dd>
<dd class="act-links"><a href="/files/download/182934/dsa-5823-1.txt" title="Size: 2.4 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182934/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182934/Debian-Security-Advisory-5823-1.html">View</span></a></dd>
</dl>
<dl id="F182933" class="file">
<dt><a class="ico text-plain" href="/files/182933/Debian-Security-Advisory-5815-2.html" title="Size: 2.2 KB">Debian Security Advisory 5815-2</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:36:28 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/2821/" class="company">Debian</a> | Site <a href="http://www.debian.org/security">debian.org</a></dd>
<dd class="detail"><p>Debian Linux Security Advisory 5815-2 - The update for needrestart announced as DSA 5815-1 introduced a regression reporting false positives for processes running in chroot or mountns. Updated packages are now available to correct this issue.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/debian">debian</a></dd>
<dd class="act-links"><a href="/files/download/182933/dsa-5815-2.txt" title="Size: 2.2 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182933/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182933/Debian-Security-Advisory-5815-2.html">View</span></a></dd>
</dl>
<dl id="F182932" class="file">
<dt><a class="ico text-plain" href="/files/182932/Paxton-Net2-Information-Disclosure-Incorrect-Access-Control.html" title="Size: 3.1 KB">Paxton Net2 Information Disclosure / Incorrect Access Control</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:32:33 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/17561/" class="person">Jeroen Hermans</a></dd>
<dd class="detail"><p>Paxton Net2 suffers from an insecure backend database issue that can lead to leaking sensitive information.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/info_disclosure">info disclosure</a></dd>
<dd class="act-links"><a href="/files/download/182932/paxtonnet2-disclose.txt" title="Size: 3.1 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182932/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182932/Paxton-Net2-Information-Disclosure-Incorrect-Access-Control.html">View</span></a></dd>
</dl>
<dl id="F182931" class="file">
<dt><a class="ico text-plain" href="/files/182931/Microsoft-Warbird-and-PMP-Security-Research.html" title="Size: 193.2 KB">Microsoft Warbird and PMP Security Research</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:25:12 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/3682/" class="person">Adam Gowdiak</a> | Site <a href="http://www.security-explorations.com/">security-explorations.com</a></dd>
<dd class="detail"><p>This paper provides an in-depth technical explanation, illustration, and verification of discovered attacks affecting PlayReady on Windows 10 / 11 x64 that pertain to Warbird deficiencies, content key sniffer operation, magic XOR keys discovery, white-box crypto attack, and complete client identity compromise attacks.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/paper">paper</a>, <a href="/files/tags/crypto">crypto</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/windows">windows</a></dd>
<dd class="act-links"><a href="/files/download/182931/wbpmp_doc.md.txt" title="Size: 193.2 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182931/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182931/Microsoft-Warbird-and-PMP-Security-Research.html">View</span></a></dd>
</dl>
<dl id="F182930" class="file">
<dt><a class="ico text-plain" href="/files/182930/Ubuntu-Security-Notice-USN-7135-1.html" title="Size: 1.2 KB">Ubuntu Security Notice USN-7135-1</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:06:07 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd>
<dd class="detail"><p>Ubuntu Security Notice 7135-1 - Bahruz Jabiyev, Anthony Gavazzi, Engin Kirda, Kaan Onarlioglu, Adi Peleg, and Harvey Tuch discovered that HAProxy incorrectly handled empty header names. A remote attacker could possibly use this issue to manipulate headers and bypass certain authentication checks and restrictions.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/remote">remote</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd>
<dd class="act-links"><a href="/files/download/182930/USN-7135-1.txt" title="Size: 1.2 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182930/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182930/Ubuntu-Security-Notice-USN-7135-1.html">View</span></a></dd>
</dl>
<dl id="F182929" class="file">
<dt><a class="ico text-plain" href="/files/182929/Ubuntu-Security-Notice-USN-7134-1.html" title="Size: 1.5 KB">Ubuntu Security Notice USN-7134-1</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:05:54 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd>
<dd class="detail"><p>Ubuntu Security Notice 7134-1 - Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/denial_of_service">denial of service</a>, <a href="/files/tags/arbitrary">arbitrary</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd>
<dd class="act-links"><a href="/files/download/182929/USN-7134-1.txt" title="Size: 1.5 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182929/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182929/Ubuntu-Security-Notice-USN-7134-1.html">View</span></a></dd>
</dl>
<dl id="F182928" class="file">
<dt><a class="ico text-plain" href="/files/182928/Ubuntu-Security-Notice-USN-7133-1.html" title="Size: 1.1 KB">Ubuntu Security Notice USN-7133-1</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:05:42 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd>
<dd class="detail"><p>Ubuntu Security Notice 7133-1 - Yuki Mogi discovered that HAProxy incorrectly handled the interpretation of certain HTTP requests. A remote attacker could possibly use this issue to perform a request smuggling attack and obtain sensitive information.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/web">web</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd>
<dd class="act-links"><a href="/files/download/182928/USN-7133-1.txt" title="Size: 1.1 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182928/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182928/Ubuntu-Security-Notice-USN-7133-1.html">View</span></a></dd>
</dl>
<dl id="F182927" class="file">
<dt><a class="ico text-plain" href="/files/182927/Red-Hat-Security-Advisory-2024-10750-03.html" title="Size: 2.1 KB">Red Hat Security Advisory 2024-10750-03</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:05:25 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="company">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2024-10750-03 - An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a code execution vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/code_execution">code execution</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/182927/RHSA-2024-10750-03.txt" title="Size: 2.1 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182927/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182927/Red-Hat-Security-Advisory-2024-10750-03.html">View</span></a></dd>
</dl>
<dl id="F182926" class="file">
<dt><a class="ico text-plain" href="/files/182926/Red-Hat-Security-Advisory-2024-10748-03.html" title="Size: 3 KB">Red Hat Security Advisory 2024-10748-03</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:05:12 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="company">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2024-10748-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 9.4 Extended Update Support. Issues addressed include bypass, cross site scripting, and spoofing vulnerabilities.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/spoof">spoof</a>, <a href="/files/tags/vulnerability">vulnerability</a>, <a href="/files/tags/xss">xss</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/182926/RHSA-2024-10748-03.txt" title="Size: 3 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182926/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182926/Red-Hat-Security-Advisory-2024-10748-03.html">View</span></a></dd>
</dl>
<dl id="F182925" class="file">
<dt><a class="ico text-plain" href="/files/182925/Red-Hat-Security-Advisory-2024-10745-03.html" title="Size: 2.9 KB">Red Hat Security Advisory 2024-10745-03</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:04:46 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="company">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2024-10745-03 - An update for firefox is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Issues addressed include bypass, cross site scripting, and spoofing vulnerabilities.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/spoof">spoof</a>, <a href="/files/tags/vulnerability">vulnerability</a>, <a href="/files/tags/xss">xss</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/182925/RHSA-2024-10745-03.txt" title="Size: 2.9 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182925/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182925/Red-Hat-Security-Advisory-2024-10745-03.html">View</span></a></dd>
</dl>
<dl id="F182924" class="file">
<dt><a class="ico text-plain" href="/files/182924/Red-Hat-Security-Advisory-2024-10743-03.html" title="Size: 2.9 KB">Red Hat Security Advisory 2024-10743-03</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:03:10 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="company">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2024-10743-03 - An update for firefox is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions. Issues addressed include bypass, cross site scripting, and spoofing vulnerabilities.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/spoof">spoof</a>, <a href="/files/tags/vulnerability">vulnerability</a>, <a href="/files/tags/xss">xss</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/182924/RHSA-2024-10743-03.txt" title="Size: 2.9 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182924/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182924/Red-Hat-Security-Advisory-2024-10743-03.html">View</span></a></dd>
</dl>
<dl id="F182923" class="file">
<dt><a class="ico text-plain" href="/files/182923/Red-Hat-Security-Advisory-2024-10742-03.html" title="Size: 2.9 KB">Red Hat Security Advisory 2024-10742-03</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:03:02 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="company">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2024-10742-03 - An update for firefox is now available for Red Hat Enterprise Linux 9.4 Extended Update Support. Issues addressed include bypass, cross site scripting, and spoofing vulnerabilities.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/spoof">spoof</a>, <a href="/files/tags/vulnerability">vulnerability</a>, <a href="/files/tags/xss">xss</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/182923/RHSA-2024-10742-03.txt" title="Size: 2.9 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182923/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182923/Red-Hat-Security-Advisory-2024-10742-03.html">View</span></a></dd>
</dl>
<dl id="F182922" class="file">
<dt><a class="ico text-plain" href="/files/182922/Red-Hat-Security-Advisory-2024-10739-03.html" title="Size: 2.1 KB">Red Hat Security Advisory 2024-10739-03</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:02:33 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="company">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2024-10739-03 - An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support. Issues addressed include a code execution vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/code_execution">code execution</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/182922/RHSA-2024-10739-03.txt" title="Size: 2.1 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182922/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182922/Red-Hat-Security-Advisory-2024-10739-03.html">View</span></a></dd>
</dl>
<dl id="F182921" class="file">
<dt><a class="ico text-plain" href="/files/182921/Red-Hat-Security-Advisory-2024-10736-03.html" title="Size: 2.1 KB">Red Hat Security Advisory 2024-10736-03</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:02:27 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="company">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2024-10736-03 - An update for the postgresql:15 module is now available for Red Hat Enterprise Linux 9.4 Extended Update Support. Issues addressed include a code execution vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/code_execution">code execution</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/182921/RHSA-2024-10736-03.txt" title="Size: 2.1 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182921/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182921/Red-Hat-Security-Advisory-2024-10736-03.html">View</span></a></dd>
</dl>
<dl id="F182920" class="file">
<dt><a class="ico text-plain" href="/files/182920/Red-Hat-Security-Advisory-2024-10734-03.html" title="Size: 3.2 KB">Red Hat Security Advisory 2024-10734-03</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:02:17 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="company">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2024-10734-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service. Issues addressed include bypass, cross site scripting, and spoofing vulnerabilities.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/spoof">spoof</a>, <a href="/files/tags/vulnerability">vulnerability</a>, <a href="/files/tags/xss">xss</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/182920/RHSA-2024-10734-03.txt" title="Size: 3.2 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182920/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182920/Red-Hat-Security-Advisory-2024-10734-03.html">View</span></a></dd>
</dl>
<dl id="F182919" class="file">
<dt><a class="ico text-plain" href="/files/182919/Red-Hat-Security-Advisory-2024-10733-03.html" title="Size: 3.2 KB">Red Hat Security Advisory 2024-10733-03</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:02:10 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="company">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2024-10733-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service. Issues addressed include bypass, cross site scripting, and spoofing vulnerabilities.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/spoof">spoof</a>, <a href="/files/tags/vulnerability">vulnerability</a>, <a href="/files/tags/xss">xss</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/182919/RHSA-2024-10733-03.txt" title="Size: 3.2 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182919/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182919/Red-Hat-Security-Advisory-2024-10733-03.html">View</span></a></dd>
</dl>
<dl id="F182918" class="file">
<dt><a class="ico text-plain" href="/files/182918/Red-Hat-Security-Advisory-2024-10710-03.html" title="Size: 3 KB">Red Hat Security Advisory 2024-10710-03</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:02:03 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="company">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2024-10710-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include bypass, cross site scripting, and spoofing vulnerabilities.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/spoof">spoof</a>, <a href="/files/tags/vulnerability">vulnerability</a>, <a href="/files/tags/xss">xss</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/182918/RHSA-2024-10710-03.txt" title="Size: 3 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182918/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182918/Red-Hat-Security-Advisory-2024-10710-03.html">View</span></a></dd>
</dl>
<dl id="F182917" class="file">
<dt><a class="ico text-plain" href="/files/182917/Red-Hat-Security-Advisory-2024-10705-03.html" title="Size: 2.3 KB">Red Hat Security Advisory 2024-10705-03</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:01:56 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="company">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2024-10705-03 - An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service. Issues addressed include a code execution vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/code_execution">code execution</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/182917/RHSA-2024-10705-03.txt" title="Size: 2.3 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182917/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182917/Red-Hat-Security-Advisory-2024-10705-03.html">View</span></a></dd>
</dl>
<dl id="F182916" class="file">
<dt><a class="ico text-plain" href="/files/182916/Red-Hat-Security-Advisory-2024-10703-03.html" title="Size: 3 KB">Red Hat Security Advisory 2024-10703-03</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:01:48 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="company">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2024-10703-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions. Issues addressed include bypass, cross site scripting, and spoofing vulnerabilities.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/spoof">spoof</a>, <a href="/files/tags/vulnerability">vulnerability</a>, <a href="/files/tags/xss">xss</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/182916/RHSA-2024-10703-03.txt" title="Size: 3 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182916/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182916/Red-Hat-Security-Advisory-2024-10703-03.html">View</span></a></dd>
</dl>
<dl id="F182915" class="file">
<dt><a class="ico text-plain" href="/files/182915/Red-Hat-Security-Advisory-2024-10700-03.html" title="Size: 2.4 KB">Red Hat Security Advisory 2024-10700-03</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:01:40 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="company">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2024-10700-03 - Red Hat build of Apache Camel 4.8 for Spring Boot release and security update is now available. Issues addressed include privilege escalation and traversal vulnerabilities.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/vulnerability">vulnerability</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/182915/RHSA-2024-10700-03.txt" title="Size: 2.4 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182915/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182915/Red-Hat-Security-Advisory-2024-10700-03.html">View</span></a></dd>
</dl>
<dl id="F182914" class="file">
<dt><a class="ico text-plain" href="/files/182914/Red-Hat-Security-Advisory-2024-10696-03.html" title="Size: 2.5 KB">Red Hat Security Advisory 2024-10696-03</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:01:30 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="company">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2024-10696-03 - An update for python-werkzeug is now available for Red Hat OpenStack Platform 16.2. Issues addressed include a remote shell upload vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/shell">shell</a>, <a href="/files/tags/python">python</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/182914/RHSA-2024-10696-03.txt" title="Size: 2.5 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182914/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182914/Red-Hat-Security-Advisory-2024-10696-03.html">View</span></a></dd>
</dl>
<dl id="F182913" class="file">
<dt><a class="ico text-plain" href="/files/182913/Red-Hat-Security-Advisory-2024-10517-03.html" title="Size: 2.9 KB">Red Hat Security Advisory 2024-10517-03</a></dt>
<dd class="datetime">Posted <a href="/files/date/2024-12-03/" title="14:01:21 UTC">Dec  3, 2024</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="company">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2024-10517-03 - Red Hat OpenShift Container Platform release 4.17.7 is now available with updates to packages and images that fix several bugs. </p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/182913/RHSA-2024-10517-03.txt" title="Size: 2.9 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/182913/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/182913/Red-Hat-Security-Advisory-2024-10517-03.html">View</span></a></dd>
</dl>
</div>
<a id="files-home-next" href="/files/page2/" style="float:right; margin:10px 0;">View Older Files &rarr;</a>
</div>
    
    
     </div>
    
      <div id="adblock">
        
      </div>
      <div id="mn">
        <div class="mn-like-us">
<ul>
<li><a href="https://twitter.com/packet_storm"><img src="https://packetstatic.com/img1514015884/s_twitter.png" width="24" height="24" alt="Follow on Twitter" /> Follow us on Twitter</a></li>
<li><a href="https://www.facebook.com/packetstormfeed"><img src="https://packetstatic.com/img1514015884/s_facebook.png" width="24" height="24" alt="Follow on Facebook" /> Follow us on Facebook</a></li>
<li><a href="/feeds"><img src="https://packetstatic.com/img1514015884/s_rss.png" width="24" height="24" alt="View RSS Feeds" /> Subscribe to an RSS Feed</a></li>
</ul>
</div>

<div id="news-home">
<h2>Recent News</h2><a href="https://rss.packetstormsecurity.com/news/" class="rss-home"><img src="https://packetstatic.com/img1514015884/bt_rss.gif" width="16" height="16" alt="News RSS Feed" /></a><br />
<dl id="N36662" class="news first">
<dt><a href="/news/view/36662/Corrupted-Microsoft-Office-Documents-Used-In-Phishing-Campaign.html">Corrupted Microsoft Office Documents Used In Phishing Campaign</a></dt>
<dd class="datetime">Posted <a href="/news/date/2024-12-03/" title="15:07:28 UTC">Dec  3, 2024</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/microsoft">microsoft</a>, <a href="/news/tags/cybercrime">cybercrime</a>, <a href="/news/tags/password">password</a>, <a href="/news/tags/phish">phish</a></dd>
<dd class="act-links"><a href="/news/favorite/36662/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.scworld.com/news/corrupted-word-documents-used-in-phishing-campaign">View</a>  </dd>
</dl>
<dl id="N36661" class="news">
<dt><a href="/news/view/36661/Meta-Says-It-Has-Taken-Down-20-Covert-Influence-Ops-In-2024.html">Meta Says It Has Taken Down 20 Covert Influence Ops In 2024</a></dt>
<dd class="datetime">Posted <a href="/news/date/2024-12-03/" title="15:07:26 UTC">Dec  3, 2024</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/russia">russia</a>, <a href="/news/tags/fraud">fraud</a>, <a href="/news/tags/cyberwar">cyberwar</a>, <a href="/news/tags/facebook">facebook</a></dd>
<dd class="act-links"><a href="/news/favorite/36661/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.theguardian.com/technology/2024/dec/03/meta-says-it-has-taken-down-about-20-covert-influence-operations-in-2024">View</a>  </dd>
</dl>
<dl id="N36660" class="news">
<dt><a href="/news/view/36660/Russia-Gives-Life-Sentence-To-Hydra-Dark-Web-Kingpin-After-Seizing-A-Ton-Of-Drugs.html">Russia Gives Life Sentence To Hydra Dark Web Kingpin After Seizing A Ton Of Drugs</a></dt>
<dd class="datetime">Posted <a href="/news/date/2024-12-03/" title="15:07:24 UTC">Dec  3, 2024</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/russia">russia</a>, <a href="/news/tags/cybercrime">cybercrime</a></dd>
<dd class="act-links"><a href="/news/favorite/36660/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.theregister.com/2024/12/03/russia_hydra_sentencing/">View</a>  </dd>
</dl>
<dl id="N36655" class="news">
<dt><a href="/news/view/36655/Zabbix-Urges-Upgrades-After-Critical-SQL-Injection-Bug-Disclosure.html">Zabbix Urges Upgrades After Critical SQL Injection Bug Disclosure</a></dt>
<dd class="datetime">Posted <a href="/news/date/2024-12-02/" title="17:47:02 UTC">Dec  2, 2024</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/flaw">flaw</a>, <a href="/news/tags/patch">patch</a></dd>
<dd class="act-links"><a href="/news/favorite/36655/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.theregister.com/2024/11/29/zabbix_urges_upgrades_after_critical/">View</a>  </dd>
</dl>
<dl id="N36654" class="news">
<dt><a href="/news/view/36654/Code-Found-Online-Exploits-LogoFAIL-To-Install-Bootkitty-Linux-Backdoor.html">Code Found Online Exploits LogoFAIL To Install Bootkitty Linux Backdoor</a></dt>
<dd class="datetime">Posted <a href="/news/date/2024-12-02/" title="17:46:57 UTC">Dec  2, 2024</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/malware">malware</a>, <a href="/news/tags/linux">linux</a>, <a href="/news/tags/flaw">flaw</a>, <a href="/news/tags/backdoor">backdoor</a></dd>
<dd class="act-links"><a href="/news/favorite/36654/" class="fav" rel="nofollow">Favorite</a> | <a href="https://arstechnica.com/security/2024/11/code-found-online-exploits-logofail-to-install-bootkitty-linux-backdoor/">View</a>  </dd>
</dl>
<dl id="N36653" class="news">
<dt><a href="/news/view/36653/Telco-Security-Is-A-Dumpster-Fire-And-Everyones-Getting-Burned.html">Telco Security Is A Dumpster Fire And Everyone&#39;s Getting Burned</a></dt>
<dd class="datetime">Posted <a href="/news/date/2024-12-02/" title="17:46:47 UTC">Dec  2, 2024</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/phone">phone</a>, <a href="/news/tags/flaw">flaw</a></dd>
<dd class="act-links"><a href="/news/favorite/36653/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.theregister.com/2024/12/02/telco_security_opinion/">View</a>  </dd>
</dl>
<dl id="N36652" class="news">
<dt><a href="/news/view/36652/Starbucks-Grocery-Stores-Hit-By-Blue-Yonder-Ransomware-Attack.html">Starbucks, Grocery Stores Hit By Blue Yonder Ransomware Attack</a></dt>
<dd class="datetime">Posted <a href="/news/date/2024-12-02/" title="17:46:34 UTC">Dec  2, 2024</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/malware">malware</a>, <a href="/news/tags/cryptography">cryptography</a></dd>
<dd class="act-links"><a href="/news/favorite/36652/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.securityweek.com/starbucks-grocery-stores-hit-by-blue-yonder-ransomware-attack/">View</a>  </dd>
</dl>
<dl id="N36651" class="news">
<dt><a href="/news/view/36651/Chinese-Lidar-Sensors-Pose-Hacking-Risk-To-US-Defense-Equipment.html">Chinese Lidar Sensors Pose Hacking Risk To US Defense Equipment</a></dt>
<dd class="datetime">Posted <a href="/news/date/2024-12-02/" title="17:46:14 UTC">Dec  2, 2024</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/government">government</a>, <a href="/news/tags/usa">usa</a>, <a href="/news/tags/china">china</a>, <a href="/news/tags/cyberwar">cyberwar</a>, <a href="/news/tags/spyware">spyware</a>, <a href="/news/tags/backdoor">backdoor</a>, <a href="/news/tags/military">military</a></dd>
<dd class="act-links"><a href="/news/favorite/36651/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.reuters.com/world/china/chinese-lidar-sensors-pose-hacking-risk-us-defense-equipment-report-says-2024-12-02/">View</a>  </dd>
</dl>
<dl id="N36650" class="news">
<dt><a href="/news/view/36650/Russian-Hacker-With-10-Million-Bounty-On-His-Head-Reportedly-Arrested.html">Russian Hacker With &#36;10 Million Bounty On His Head Reportedly Arrested</a></dt>
<dd class="datetime">Posted <a href="/news/date/2024-12-02/" title="17:46:01 UTC">Dec  2, 2024</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/hacker">hacker</a>, <a href="/news/tags/russia">russia</a></dd>
<dd class="act-links"><a href="/news/favorite/36650/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.securityweek.com/russian-hacker-with-10-million-bounty-on-his-head-reportedly-arrested/">View</a>  </dd>
</dl>
<dl id="N36649" class="news">
<dt><a href="/news/view/36649/US-Senators-Propose-Law-To-Require-Bare-Minimum-Security-Standards.html">US Senators Propose Law To Require Bare Minimum Security Standards</a></dt>
<dd class="datetime">Posted <a href="/news/date/2024-11-27/" title="15:38:15 UTC">Nov 27, 2024</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/government">government</a>, <a href="/news/tags/usa">usa</a>, <a href="/news/tags/password">password</a></dd>
<dd class="act-links"><a href="/news/favorite/36649/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.theregister.com/2024/11/26/us_senators_healthcare_cybersecurity/">View</a>  </dd>
</dl>

<a href="/news/" style="float:right; margin:10px 0;">View More News &rarr;</a>
</div>
<div>
<form id="cal" action="/files/cal/" method="get">
<h2>File Archive:</h2><h3>December 2024</h3>
<button id="cal-prev" name="cal-prev" type="button" value="2024-12"><span>&lt;</span></button><ul class="dotw"><li>Su</li><li>Mo</li><li>Tu</li><li>We</li><li>Th</li><li>Fr</li><li>Sa</li></ul>
<ul><li class="none"><a href="/files/date/2024-12-01/">1</a><div class="stats"><div class="point"></div><div class="date">Dec 1st</div><div class="count">0 Files</div></div></li><li class="med"><a href="/files/date/2024-12-02/">2</a><div class="stats"><div class="point"></div><div class="date">Dec 2nd</div><div class="count">41 Files</div></div></li><li class="med"><a href="/files/date/2024-12-03/">3</a><div class="stats"><div class="point"></div><div class="date">Dec 3rd</div><div class="count">25 Files</div></div></li><li class="none today"><a href="/files/date/2024-12-04/">4</a><div class="stats"><div class="point"></div><div class="date">Dec 4th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-05/">5</a><div class="stats"><div class="point"></div><div class="date">Dec 5th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-06/">6</a><div class="stats"><div class="point"></div><div class="date">Dec 6th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-07/">7</a><div class="stats"><div class="point"></div><div class="date">Dec 7th</div><div class="count">0 Files</div></div></li></ul>
<ul><li class="none"><a href="/files/date/2024-12-08/">8</a><div class="stats"><div class="point"></div><div class="date">Dec 8th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-09/">9</a><div class="stats"><div class="point"></div><div class="date">Dec 9th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-10/">10</a><div class="stats"><div class="point"></div><div class="date">Dec 10th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-11/">11</a><div class="stats"><div class="point"></div><div class="date">Dec 11th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-12/">12</a><div class="stats"><div class="point"></div><div class="date">Dec 12th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-13/">13</a><div class="stats"><div class="point"></div><div class="date">Dec 13th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-14/">14</a><div class="stats"><div class="point"></div><div class="date">Dec 14th</div><div class="count">0 Files</div></div></li></ul>
<ul><li class="none"><a href="/files/date/2024-12-15/">15</a><div class="stats"><div class="point"></div><div class="date">Dec 15th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-16/">16</a><div class="stats"><div class="point"></div><div class="date">Dec 16th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-17/">17</a><div class="stats"><div class="point"></div><div class="date">Dec 17th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-18/">18</a><div class="stats"><div class="point"></div><div class="date">Dec 18th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-19/">19</a><div class="stats"><div class="point"></div><div class="date">Dec 19th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-20/">20</a><div class="stats"><div class="point"></div><div class="date">Dec 20th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-21/">21</a><div class="stats"><div class="point"></div><div class="date">Dec 21st</div><div class="count">0 Files</div></div></li></ul>
<ul><li class="none"><a href="/files/date/2024-12-22/">22</a><div class="stats"><div class="point"></div><div class="date">Dec 22nd</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-23/">23</a><div class="stats"><div class="point"></div><div class="date">Dec 23rd</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-24/">24</a><div class="stats"><div class="point"></div><div class="date">Dec 24th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-25/">25</a><div class="stats"><div class="point"></div><div class="date">Dec 25th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-26/">26</a><div class="stats"><div class="point"></div><div class="date">Dec 26th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-27/">27</a><div class="stats"><div class="point"></div><div class="date">Dec 27th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-28/">28</a><div class="stats"><div class="point"></div><div class="date">Dec 28th</div><div class="count">0 Files</div></div></li></ul>
<ul><li class="none"><a href="/files/date/2024-12-29/">29</a><div class="stats"><div class="point"></div><div class="date">Dec 29th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-30/">30</a><div class="stats"><div class="point"></div><div class="date">Dec 30th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2024-12-31/">31</a><div class="stats"><div class="point"></div><div class="date">Dec 31st</div><div class="count">0 Files</div></div></li><li></li><li></li><li></li><li></li></ul>
</form></div>
<div id="mn-top-author" class="top-ten">
<h2>Top Authors In Last 30 Days</h2>
<ul>
<li><a href="/files/authors/4676">Red Hat</a> <span>308 files</span></li>
<li><a href="/files/authors/3695">Ubuntu</a> <span>67 files</span></li>
<li><a href="/files/authors/2821">Debian</a> <span>24 files</span></li>
<li><a href="/files/authors/3417">Gentoo</a> <span>8 files</span></li>
<li><a href="/files/authors/11596">Google Security Research</a> <span>7 files</span></li>
<li><a href="/files/authors/5960">LiquidWorm</a> <span>6 files</span></li>
<li><a href="/files/authors/2397">Apple</a> <span>5 files</span></li>
<li><a href="/files/authors/10455">Jann Horn</a> <span>3 files</span></li>
<li><a href="/files/authors/8679">Spencer McIntyre</a> <span>3 files</span></li>
<li><a href="/files/authors/14813">Milad Karimi</a> <span>3 files</span></li>
</ul>
</div>
<div id="mn-tag-file"><h2>File Tags</h2><ul><li><a href="/files/tags/activex/">ActiveX</a> <span>(933)</span></li><li><a href="/files/tags/advisory/">Advisory</a> <span>(87,803)</span></li><li><a href="/files/tags/arbitrary/">Arbitrary</a> <span>(17,220)</span></li><li><a href="/files/tags/bbs/">BBS</a> <span>(2,859)</span></li><li><a href="/files/tags/bypass/">Bypass</a> <span>(1,949)</span></li><li><a href="/files/tags/cgi/">CGI</a> <span>(1,051)</span></li><li><a href="/files/tags/code_execution/">Code Execution</a> <span>(8,020)</span></li><li><a href="/files/tags/conference/">Conference</a> <span>(693)</span></li><li><a href="/files/tags/cracker/">Cracker</a> <span>(845)</span></li><li><a href="/files/tags/csrf/">CSRF</a> <span>(3,440)</span></li><li><a href="/files/tags/denial_of_service/">DoS</a> <span>(25,560)</span></li><li><a href="/files/tags/encryption/">Encryption</a> <span>(2,398)</span></li><li><a href="/files/tags/exploit/">Exploit</a> <span>(54,528)</span></li><li><a href="/files/tags/file_inclusion/">File Inclusion</a> <span>(4,281)</span></li><li><a href="/files/tags/file_upload/">File Upload</a> <span>(1,029)</span></li><li><a href="/files/tags/firewall/">Firewall</a> <span>(822)</span></li><li><a href="/files/tags/info_disclosure/">Info Disclosure</a> <span>(2,946)</span></li><li><a href="/files/tags/intrusion_detection/">Intrusion Detection</a> <span>(925)</span></li><li><a href="/files/tags/java/">Java</a> <span>(3,166)</span></li><li><a href="/files/tags/javascript/">JavaScript</a> <span>(913)</span></li><li><a href="/files/tags/kernel/">Kernel</a> <span>(7,392)</span></li><li><a href="/files/tags/local/">Local</a> <span>(14,904)</span></li><li><a href="/files/tags/magazine/">Magazine</a> <span>(587)</span></li><li><a href="/files/tags/overflow/">Overflow</a> <span>(13,303)</span></li><li><a href="/files/tags/perl/">Perl</a> <span>(1,441)</span></li><li><a href="/files/tags/php/">PHP</a> <span>(5,340)</span></li><li><a href="/files/tags/proof_of_concept/">Proof of Concept</a> <span>(2,425)</span></li><li><a href="/files/tags/protocol/">Protocol</a> <span>(3,763)</span></li><li><a href="/files/tags/python/">Python</a> <span>(1,697)</span></li><li><a href="/files/tags/remote/">Remote</a> <span>(32,021)</span></li><li><a href="/files/tags/root/">Root</a> <span>(3,683)</span></li><li><a href="/files/tags/rootkit/">Rootkit</a> <span>(532)</span></li><li><a href="/files/tags/ruby/">Ruby</a> <span>(647)</span></li><li><a href="/files/tags/scanner/">Scanner</a> <span>(1,664)</span></li><li><a href="/files/tags/tool/">Security Tool</a> <span>(8,077)</span></li><li><a href="/files/tags/shell/">Shell</a> <span>(3,336)</span></li><li><a href="/files/tags/shellcode/">Shellcode</a> <span>(1,219)</span></li><li><a href="/files/tags/sniffer/">Sniffer</a> <span>(906)</span></li><li><a href="/files/tags/spoof/">Spoof</a> <span>(2,336)</span></li><li><a href="/files/tags/sql_injection/">SQL Injection</a> <span>(16,755)</span></li><li><a href="/files/tags/tcp/">TCP</a> <span>(2,465)</span></li><li><a href="/files/tags/trojan/">Trojan</a> <span>(690)</span></li><li><a href="/files/tags/udp/">UDP</a> <span>(921)</span></li><li><a href="/files/tags/virus/">Virus</a> <span>(675)</span></li><li><a href="/files/tags/vulnerability/">Vulnerability</a> <span>(33,346)</span></li><li><a href="/files/tags/web/">Web</a> <span>(10,205)</span></li><li><a href="/files/tags/paper/">Whitepaper</a> <span>(3,787)</span></li><li><a href="/files/tags/x86/">x86</a> <span>(973)</span></li><li><a href="/files/tags/xss/">XSS</a> <span>(18,378)</span></li><li><a href="/files/tags/">Other</a></li></ul></div><div id="mn-arch-file"><h2>File Archives</h2><ul><li><a href="/files/date/2024-12/">December 2024</a></li><li><a href="/files/date/2024-11/">November 2024</a></li><li><a href="/files/date/2024-10/">October 2024</a></li><li><a href="/files/date/2024-09/">September 2024</a></li><li><a href="/files/date/2024-08/">August 2024</a></li><li><a href="/files/date/2024-07/">July 2024</a></li><li><a href="/files/date/2024-06/">June 2024</a></li><li><a href="/files/date/2024-05/">May 2024</a></li><li><a href="/files/date/2024-04/">April 2024</a></li><li><a href="/files/date/2024-03/">March 2024</a></li><li><a href="/files/date/2024-02/">February 2024</a></li><li><a href="/files/date/2024-01/">January 2024</a></li><li><a href="/files/date/">Older</a></li></ul></div><div id="mn-os-file"><h2>Systems</h2><ul><li><a href="/files/os/aix/">AIX</a> <span>(430)</span></li><li><a href="/files/os/apple/">Apple</a> <span>(2,133)</span></li><li><a href="/files/os/bsd/">BSD</a> <span>(378)</span></li><li><a href="/files/os/centos/">CentOS</a> <span>(61)</span></li><li><a href="/files/os/cisco/">Cisco</a> <span>(1,954)</span></li><li><a href="/files/os/debian/">Debian</a> <span>(7,177)</span></li><li><a href="/files/os/fedora/">Fedora</a> <span>(1,693)</span></li><li><a href="/files/os/freebsd/">FreeBSD</a> <span>(1,247)</span></li><li><a href="/files/os/gentoo/">Gentoo</a> <span>(4,607)</span></li><li><a href="/files/os/hpux/">HPUX</a> <span>(881)</span></li><li><a href="/files/os/ios/">iOS</a> <span>(395)</span></li><li><a href="/files/os/iphone/">iPhone</a> <span>(108)</span></li><li><a href="/files/os/irix/">IRIX</a> <span>(220)</span></li><li><a href="/files/os/juniper/">Juniper</a> <span>(71)</span></li><li><a href="/files/os/linux/">Linux</a> <span>(52,160)</span></li><li><a href="/files/os/osx/">Mac OS X</a> <span>(696)</span></li><li><a href="/files/os/mandriva/">Mandriva</a> <span>(3,105)</span></li><li><a href="/files/os/netbsd/">NetBSD</a> <span>(256)</span></li><li><a href="/files/os/openbsd/">OpenBSD</a> <span>(490)</span></li><li><a href="/files/os/redhat/">RedHat</a> <span>(17,495)</span></li><li><a href="/files/os/slackware/">Slackware</a> <span>(941)</span></li><li><a href="/files/os/solaris/">Solaris</a> <span>(1,615)</span></li><li><a href="/files/os/suse/">SUSE</a> <span>(1,444)</span></li><li><a href="/files/os/ubuntu/">Ubuntu</a> <span>(10,025)</span></li><li><a href="/files/os/unix/">UNIX</a> <span>(9,482)</span></li><li><a href="/files/os/unixware/">UnixWare</a> <span>(188)</span></li><li><a href="/files/os/windows/">Windows</a> <span>(6,786)</span></li><li><a href="/files/os/">Other</a></li></ul></div><div id="mn-tag-news"><h2>News Tags</h2><ul><li><a href="/news/tags/zero_day/">0 Day</a> <span>(319)</span></li><li><a href="/news/tags/adobe/">Adobe</a> <span>(310)</span></li><li><a href="/news/tags/anonymous/">Anonymous</a> <span>(350)</span></li><li><a href="/news/tags/apple/">Apple</a> <span>(1,076)</span></li><li><a href="/news/tags/backdoor/">Backdoor</a> <span>(725)</span></li><li><a href="/news/tags/bank/">Bank</a> <span>(1,216)</span></li><li><a href="/news/tags/botnet/">Botnet</a> <span>(598)</span></li><li><a href="/news/tags/britain/">Britain</a> <span>(1,120)</span></li><li><a href="/news/tags/china/">China</a> <span>(968)</span></li><li><a href="/news/tags/cisco/">Cisco</a> <span>(220)</span></li><li><a href="/news/tags/conference/">Conference</a> <span>(329)</span></li><li><a href="/news/tags/cryptography/">Cryptography</a> <span>(1,672)</span></li><li><a href="/news/tags/cybercrime/">Cybercrime</a> <span>(2,183)</span></li><li><a href="/news/tags/cyberwar/">Cyberwar</a> <span>(1,983)</span></li><li><a href="/news/tags/data_loss/">Data Loss</a> <span>(4,060)</span></li><li><a href="/news/tags/database/">Database</a> <span>(227)</span></li><li><a href="/news/tags/denial_of_service/">DoS</a> <span>(566)</span></li><li><a href="/news/tags/email/">Email</a> <span>(523)</span></li><li><a href="/news/tags/facebook/">Facebook</a> <span>(837)</span></li><li><a href="/news/tags/fbi/">FBI</a> <span>(464)</span></li><li><a href="/news/tags/flaw/">Flaw</a> <span>(4,646)</span></li><li><a href="/news/tags/fraud/">Fraud</a> <span>(2,716)</span></li><li><a href="/news/tags/google/">Google</a> <span>(1,579)</span></li><li><a href="/news/tags/government/">Government</a> <span>(7,112)</span></li><li><a href="/news/tags/hacker/">Hacker</a> <span>(7,739)</span></li><li><a href="/news/tags/headline/">Headline</a> <span>(20,235)</span></li><li><a href="/news/tags/identity_theft/">Identity Theft</a> <span>(220)</span></li><li><a href="/news/tags/iran/">Iran</a> <span>(232)</span></li><li><a href="/news/tags/linux/">Linux</a> <span>(267)</span></li><li><a href="/news/tags/malware/">Malware</a> <span>(2,802)</span></li><li><a href="/news/tags/microsoft/">Microsoft</a> <span>(1,855)</span></li><li><a href="/news/tags/military/">Military</a> <span>(234)</span></li><li><a href="/news/tags/mozilla/">Mozilla</a> <span>(219)</span></li><li><a href="/news/tags/nsa/">NSA</a> <span>(678)</span></li><li><a href="/news/tags/password/">Password</a> <span>(807)</span></li><li><a href="/news/tags/patch/">Patch</a> <span>(1,039)</span></li><li><a href="/news/tags/phish/">Phish</a> <span>(391)</span></li><li><a href="/news/tags/phone/">Phone</a> <span>(1,951)</span></li><li><a href="/news/tags/privacy/">Privacy</a> <span>(4,854)</span></li><li><a href="/news/tags/russia/">Russia</a> <span>(1,091)</span></li><li><a href="/news/tags/scada/">Scada</a> <span>(210)</span></li><li><a href="/news/tags/scam/">Scam</a> <span>(274)</span></li><li><a href="/news/tags/science/">Science</a> <span>(536)</span></li><li><a href="/news/tags/social/">Social</a> <span>(474)</span></li><li><a href="/news/tags/space/">Space</a> <span>(260)</span></li><li><a href="/news/tags/spam/">Spam</a> <span>(380)</span></li><li><a href="/news/tags/spyware/">Spyware</a> <span>(1,629)</span></li><li><a href="/news/tags/terror/">Terror</a> <span>(411)</span></li><li><a href="/news/tags/trojan/">Trojan</a> <span>(321)</span></li><li><a href="/news/tags/twitter/">Twitter</a> <span>(404)</span></li><li><a href="/news/tags/usa/">USA</a> <span>(3,973)</span></li><li><a href="/news/tags/virus/">Virus</a> <span>(397)</span></li><li><a href="/news/tags/wireless/">Wireless</a> <span>(231)</span></li><li><a href="/news/tags/worm/">Worm</a> <span>(201)</span></li><li><a href="/news/tags/">Other</a></li></ul></div><div id="mn-arch-news"><h2>News Archives</h2><ul><li><a href="/news/date/2024-12/">December 2024</a></li><li><a href="/news/date/2024-11/">November 2024</a></li><li><a href="/news/date/2024-10/">October 2024</a></li><li><a href="/news/date/2024-09/">September 2024</a></li><li><a href="/news/date/2024-08/">August 2024</a></li><li><a href="/news/date/2024-07/">July 2024</a></li><li><a href="/news/date/2024-06/">June 2024</a></li><li><a href="/news/date/2024-05/">May 2024</a></li><li><a href="/news/date/2024-04/">April 2024</a></li><li><a href="/news/date/2024-03/">March 2024</a></li><li><a href="/news/date/2024-02/">February 2024</a></li><li><a href="/news/date/2024-01/">January 2024</a></li><li><a href="/news/date/">Older</a></li></ul></div>
      </div>

  </div>

</div>

<div id="f">
  <div id="fc">

    <div class="f-box" style="margin: 50px 0 0 0;">
        <a href="/"><img src="https://packetstatic.com/img1514015884/ps_logo.png" width="218" alt="packet storm" /></a>
    <p class="copy">&copy; 2024 Packet Storm. All rights reserved.</p>
    </div>

    <div class="f-box">
    <dl>
      <dt>Site Links</dt>
      <dd><a href="/news/date/">News by Month</a></dd>
      <dd><a href="/news/tags/">News Tags</a></dd>
      <dd><a href="/files/date/">Files by Month</a></dd>
      <dd><a href="/files/tags/">File Tags</a></dd>
      <dd><a href="/files/directory/">File Directory</a></dd>
    </dl>    
    </div>

    <div class="f-box">
    <dl>
      <dt>About Us</dt>
      <dd><a href="/about/">History &amp; Purpose</a></dd>
      <dd><a href="/contact/">Contact Information</a></dd>
      <dd><a href="/legal/tos.html">Terms of Service</a></dd>
      <dd><a href="/legal/privacy.html">Privacy Statement</a></dd>
      <dd><a href="/legal/copyright.html">Copyright Information</a></dd>
    </dl>
    </div>

    <div class="f-box">
	<dl>
      <dt>Services</dt>
      <dd><a href="/services/">Security Services</a></dd>
      <dt style="margin-top:1.5em;">Hosting By</dt>
      <dd><a href="http://www.rokasecurity.com/">Rokasec</a></dd>
    </dl>   
    </div>
    <div class="f-box">
    <ul class="f-follow">
     <li><a href="https://twitter.com/packet_storm"><img width="24" height="24" alt="Follow on Twitter" src="https://packetstatic.com/img1514015884/s_twitter.png" /> Follow us on Twitter</a></li>
     <li><a href="https://www.facebook.com/packetstormfeed"><img width="24" height="24" alt="Follow on Facebook" src="https://packetstatic.com/img1514015884/s_facebook.png" /> Follow us on Facebook</a></li>
     <li><a href="/feeds"><img width="24" height="24" alt="View RSS Feeds" src="https://packetstatic.com/img1514015884/s_rss.png" /> Subscribe to an RSS Feed</a></li>
    </ul>
    </div>

  </div>
</div>

<div id="o-box"><img src="https://packetstatic.com/img1514015884/o_close.png" alt="close" height="30" width="30" id="o-close" /><div id="o-main"></div></div>


<script type="text/javascript"> var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-18885198-1']); _gaq.push (['_gat._anonymizeIp']); _gaq.push(['_setDomainName', '.packetstormsecurity.com']); _gaq.push(['_trackPageview']); (function() {var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.googleanalytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s);})(); </script><noscript><img src="https://ssl.google-analytics.com/__utm.gif?utmwv=1.3&amp;utmn=1028677162&amp;utmcs=ISO-8859-1&amp;utmsr=31337x31337&amp;utmsc=32-bit&amp;utmul=en-us&amp;utmje=0&amp;utmfl=-&amp;utmcn=1&amp;utmdt=%u2248%20Packet%20Storm&amp;utmhn=packetstormsecurity.com&amp;utmr=-&amp;utmp=%2F&amp;utmac=UA-18885198-1&amp;utmcc=__utma%3D32867617.1028677162.1733299030.1733299030.1733299030.1%3B%2B__utmz%3D32867617.1733299030.1.1.utmccn%3D(direct)%7Cutmcsr%3D(direct)%7Cutmcmd%3D(none)" width="2" height="2" alt="" /></noscript>
<!-- Wed, 4 Dec 2024 07:57:10 GMT -->
</body>
</html>

Resolver

Resolver ASN
AS34927
Resolver IP
45.134.88.121
Resolver Network Name
iFog GmbH
Report ID
20241204T075514Z_webconnectivity_IS_51896_n1_6a9w023v5oHWcSvk
Platform
windows
Software Name
ooniprobe-desktop-unattended (3.14.1)
Measurement Engine
ooniprobe-engine (3.14.1)

Raw Measurement Data

Loading