Websites
Websites
Runtime: 4.3s
Share on Facebook or Twitter
On September 18, 2021 at 4:24:03 PM UTC, https://packetstormsecurity.com/ was accessible when tested on AS44244 in Iran.

Failures

HTTP Experiment
null
DNS Experiment
null
Control
null

DNS Queries

Resolver:
147.75.101.85
Query:
IN A packetstormsecurity.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
198.84.60.198
AS54876 (ROKABEAR LLC)

TCP Connections

198.84.60.198:443: succeeded

HTTP Requests

URL
GET https://packetstormsecurity.com/
Response Headers
Cache-Control:
no-cache, no-store, private, must-revalidate, proxy-revalidate
Connection:
keep-alive
Content-Type:
text/html; charset=utf-8
Date:
Sat, 18 Sep 2021 16:31:20 GMT
Expires:
0
Server:
EMX
Set-Cookie:
P=0; expires=Fri, 5-May-1999 05:05:05 GMT; domain=.packetstormsecurity.com; path=/; HttpOnly; secure
Strict-Transport-Security:
max-age=3600
Vary:
Accept-Encoding
X-Content-Type-Options:
nosniff
X-Frame-Options:
SAMEORIGIN
X-Xss-Protection:
1; mode=block
Response Body
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-type" content="text/html;charset=utf-8" />
<title>Packet Storm</title>
<meta name="description" content="Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers" />
<meta name="keywords" content="security,exploit,advisory,whitepaper,xss,csrf,overflow,scanner,vulnerability" />
<link rel="shortcut icon" href="/img/pss.ico" />
<link rel="stylesheet" media="screen,print,handheld" href="https://packetstatic.com/css1589669798/pss.css" type="text/css" />
<!--[if lt ie 8]><link rel="stylesheet" type="text/css" href="https://packetstatic.com/css1589669798/ie.css" /><![endif]-->
<script type="text/javascript" src="https://packetstatic.com/js1589669798/pt.js"></script>
<script type="text/javascript" src="https://packetstatic.com/js1589669798/pss.js"></script>
<link rel="search" type="application/opensearchdescription+xml" href="https://packetstormsecurity.com/opensearch.xml" title="Packet Storm Site Search" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Headlines" href="https://rss.packetstormsecurity.com/news/" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Recent Files" href="https://rss.packetstormsecurity.com/files/" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Exploits" href="https://rss.packetstormsecurity.com/files/tags/exploit/" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Advisories" href="https://rss.packetstormsecurity.com/files/tags/advisory/" />
</head>
<body id="home">
<div id="t">
   <div id="tc">
      <a id="top" href="/"><img src="https://packetstatic.com/img1514015884/ps_logo.png" width="315" height="65" id="logo" alt="packet storm" /></a>
      <div id="slogan">exploit the possibilities
</div>
      <div id="account"><a href="https://packetstormsecurity.com/account/register/">Register</a> | <a href="https://packetstormsecurity.com/account/login/">Login</a></div>
      <div id="search">
        <form method="get" action="/search/"><input type="text" name="q" id="q" maxlength="120" value="Search &#8230;" /><button type="submit"></button><div id="q-tabs"><label for="s-files" class="on">Files</label><label for="s-news">News</label><label for="s-users">Users</label><label for="s-authors">Authors</label><input type="radio" value="files" name="s" id="s-files" /><input type="radio" value="news" name="s" id="s-news" /><input type="radio" value="users" name="s" id="s-users" /><input type="radio" value="authors" name="s" id="s-authors" /></div></form>
      </div>
   </div>
    <div id="tn"><div id="tnc">
        <a href="/" id="tn-home"><span>Home</span></a> <a href="/files/" id="tn-files"><span>Files</span></a> <a href="/news/" id="tn-news"><span>News</span></a> <a href="/about/" id="tn-about"><span>About</span></a> <a href="/contact/" id="tn-contact"><span>Contact</span></a> <a href="/submit/" id="tn-submit"><span>Add New</span></a>
    </div></div>
    <div id="tn2"></div>
</div>

<div id="c">

 <div id="cc">
     <div id="m">
    

    
    
     
    
    <div id="news-headline"><dl id="N32643" class="news first">
<dd class="detail sd"><a href="/news/view/32643/Microsoft-MSHTML-Flaw-Exploited-By-Ryuk-Ransomware-Gang.html"><img src="https://packetstatic.com/art/m/microsoftsign-420.jpg" width="420" alt="" /></a></dd>
<dt><a href="/news/view/32643/Microsoft-MSHTML-Flaw-Exploited-By-Ryuk-Ransomware-Gang.html">Microsoft MSHTML Flaw Exploited By Ryuk Ransomware Gang</a></dt>
</dl>
<dl id="N32644" class="news">
<dd class="detail sd"><a href="/news/view/32644/Tesla-To-Work-With-Global-Regulators-On-Data-Security.html"><img src="https://packetstatic.com/art/t/tesla-100.jpg" width="100" alt="" /></a></dd>
<dt><a href="/news/view/32644/Tesla-To-Work-With-Global-Regulators-On-Data-Security.html">Tesla To Work With Global Regulators On Data Security</a></dt>
</dl>
<dl id="N32646" class="news">
<dd class="detail sd"><a href="/news/view/32646/Cryptocurrency-Launchpad-Hit-By-3-Million-Supply-Chain-Attack.html"><img src="https://packetstatic.com/art/g/github-100.jpg" width="100" alt="" /></a></dd>
<dt><a href="/news/view/32646/Cryptocurrency-Launchpad-Hit-By-3-Million-Supply-Chain-Attack.html">Cryptocurrency Launchpad Hit By &#36;3 Million Supply Chain Attack</a></dt>
</dl>
<dl id="N32645" class="news">
<dd class="detail sd"><a href="/news/view/32645/Telegram-Emerges-As-New-Dark-Web-For-Cyber-Criminals.html"><img src="https://packetstatic.com/art/t/telegram-100.jpg" width="100" alt="" /></a></dd>
<dt><a href="/news/view/32645/Telegram-Emerges-As-New-Dark-Web-For-Cyber-Criminals.html">Telegram Emerges As New Dark Web For Cyber Criminals</a></dt>
</dl>
</div><div id="files-home">
<h2>Recent Files</h2><a href="https://rss.packetstormsecurity.com/files/" class="rss-home"><img src="https://packetstatic.com/img1514015884/bt_rss.gif" width="16" height="16" alt="Files RSS Feed" /></a>
<div class="tab-box"><div id="lv" title="Toggle List View"></div><ul class="tabs"><li class="tab on"><a href="/files/">All</a></li><li class="tab"><a href="/files/tags/exploit/">Exploits</a></li><li class="tab"><a href="/files/tags/advisory/">Advisories</a></li><li class="tab"><a href="/files/tags/tool/">Tools</a></li><li class="tab"><a href="/files/tags/paper/">Whitepapers</a></li><li class="tab"><a href="/files/tags/">Other</a></li></ul><div class="tabs-cut"></div></div>
<div id="files-home-list">
<dl id="F164193" class="file first">
<dt><a class="ico text-plain" href="/files/164193/Ubuntu-Security-Notice-USN-5073-2.html" title="Size: 3.1 KB">Ubuntu Security Notice USN-5073-2</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-17/" title="16:12:36 UTC">Sep 17, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd>
<dd class="detail"><p>Ubuntu Security Notice 5073-2 - Maxim Levitsky and Paolo Bonzini discovered that the KVM hypervisor implementation for AMD processors in the Linux kernel allowed a guest VM to disable restrictions on VMLOAD/VMSAVE in a nested guest. An attacker in a guest VM could use this to read or write portions of the host&#39;s physical memory. Maxim Levitsky discovered that the KVM hypervisor implementation for AMD processors in the Linux kernel did not properly prevent a guest VM from enabling AVIC in nested guest VMs. An attacker in a guest VM could use this to write to portions of the host&#39;s physical memory. Various other issues were also addressed.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/kernel">kernel</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd>
<dd class="act-links"><a href="/files/download/164193/USN-5073-2.txt" title="Size: 3.1 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164193/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164193/Ubuntu-Security-Notice-USN-5073-2.html">View</span></a></dd>
</dl>
<dl id="F164192" class="file">
<dt><a class="ico text-plain" href="/files/164192/Red-Hat-Security-Advisory-2021-3556-01.html" title="Size: 7.7 KB">Red Hat Security Advisory 2021-3556-01</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-17/" title="16:04:56 UTC">Sep 17, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="person">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2021-3556-01 - Red Hat OpenShift Serverless 1.17.0 release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7 and 4.8, and includes security and bug fixes and enhancements.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/164192/RHSA-2021-3556-01.txt" title="Size: 7.7 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164192/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164192/Red-Hat-Security-Advisory-2021-3556-01.html">View</span></a></dd>
</dl>
<dl id="F164191" class="file">
<dt><a class="ico text-plain" href="/files/164191/Geutebruck-instantrec-Remote-Command-Execution.html" title="Size: 3.3 KB">Geutebruck instantrec Remote Command Execution</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-17/" title="16:02:46 UTC">Sep 17, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/15878/" class="person">Titouan Lazard</a>, <a href="/files/author/15880/" class="person">Ibrahim Ayadhi</a> | Site <a href="http://www.metasploit.com">metasploit.com</a></dd>
<dd class="detail"><p>This Metasploit module exploits a buffer overflow within the &#39;action&#39; parameter of the /uapi-cgi/instantrec.cgi page of Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx, ETHC-22xx, and EWPC-22xx devices running firmware versions equal to 1.12.0.27 as well as firmware versions 1.12.13.2 and 1.12.14.5. Successful exploitation results in remote code execution as the root user.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/overflow">overflow</a>, <a href="/files/tags/cgi">cgi</a>, <a href="/files/tags/root">root</a>, <a href="/files/tags/code_execution">code execution</a></dd>
<dd class="act-links"><a href="/files/download/164191/geutebruck_instantrec_bof.rb.txt" title="Size: 3.3 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164191/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164191/Geutebruck-instantrec-Remote-Command-Execution.html">View</span></a></dd>
</dl>
<dl id="F164190" class="file">
<dt><a class="ico text-plain" href="/files/164190/Ubuntu-Security-Notice-USN-5083-1.html" title="Size: 1.5 KB">Ubuntu Security Notice USN-5083-1</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-17/" title="16:02:38 UTC">Sep 17, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd>
<dd class="detail"><p>Ubuntu Security Notice 5083-1 - It was discovered that Python incorrectly handled certain RFCs. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 ESM. It was discovered that Python incorrectly handled certain server responses. An attacker could possibly use this issue to cause a denial of service.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/denial_of_service">denial of service</a>, <a href="/files/tags/python">python</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd>
<dd class="act-links"><a href="/files/download/164190/USN-5083-1.txt" title="Size: 1.5 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164190/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164190/Ubuntu-Security-Notice-USN-5083-1.html">View</span></a></dd>
</dl>
<dl id="F164189" class="file">
<dt><a class="ico application-pdf" href="/files/164189/Windows-Media-Player-12.0.9600.19145-Improper-Synchronization.html" title="Size: 142.7 KB">Windows Media Player 12.0.9600.19145 Improper Synchronization</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-17/" title="15:59:42 UTC">Sep 17, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/14917/" class="person">Ofir Moskovitch</a></dd>
<dd class="detail"><p>Windows Media Player version 12.0.9600.19145 suffers from an improper synchronization vulnerability that cause a freeze or an exploitable buffer overrun crash and may potentially lead to code execution and information disclosure.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/overflow">overflow</a>, <a href="/files/tags/code_execution">code execution</a>, <a href="/files/tags/info_disclosure">info disclosure</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/windows">windows</a></dd>
<dd class="act-links"><a href="/files/download/164189/wmp-improper-synchronization.pdf" title="Size: 142.7 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164189/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164189/Windows-Media-Player-12.0.9600.19145-Improper-Synchronization.html">View</span></a></dd>
</dl>
<dl id="F164188" class="file">
<dt><a class="ico text-plain" href="/files/164188/Ubuntu-Security-Notice-USN-5081-1.html" title="Size: 1.5 KB">Ubuntu Security Notice USN-5081-1</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-17/" title="15:59:20 UTC">Sep 17, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd>
<dd class="detail"><p>Ubuntu Security Notice 5081-1 - It was discovered that Qt incorrectly handled certain XBM image files. If a user or automated system were tricked into opening a specially crafted PPM file, a remote attacker could cause Qt to crash, resulting in a denial of service. It was discovered that Qt incorrectly handled certain graphics operations. If a user or automated system were tricked into performing certain graphics operations, a remote attacker could cause Qt to crash, resulting in a denial of service. Various other issues were also addressed.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/denial_of_service">denial of service</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd>
<dd class="act-links"><a href="/files/download/164188/USN-5081-1.txt" title="Size: 1.5 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164188/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164188/Ubuntu-Security-Notice-USN-5081-1.html">View</span></a></dd>
</dl>
<dl id="F164187" class="file">
<dt><a class="ico text-plain" href="/files/164187/WordPress-WooCommerce-Booster-5.4.3-Authentication-Bypass.html" title="Size: 2.4 KB">WordPress WooCommerce Booster 5.4.3 Authentication Bypass</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-17/" title="15:58:22 UTC">Sep 17, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/15900/" class="person">Sebastian Kriesten</a></dd>
<dd class="detail"><p>WordPress WooCommerce Booster plugin version 5.4.3 suffers from an authentication bypass vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/bypass">bypass</a></dd>
<dd class="act-links"><a href="/files/download/164187/wpwoocommercebooster543-bypass.txt" title="Size: 2.4 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164187/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164187/WordPress-WooCommerce-Booster-5.4.3-Authentication-Bypass.html">View</span></a></dd>
</dl>
<dl id="F164186" class="file">
<dt><a class="ico text-plain" href="/files/164186/Ubuntu-Security-Notice-USN-5071-2.html" title="Size: 3.6 KB">Ubuntu Security Notice USN-5071-2</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-17/" title="15:57:33 UTC">Sep 17, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd>
<dd class="detail"><p>Ubuntu Security Notice 5071-2 - USN-5071-1 fixed vulnerabilities in the Linux kernel for Ubuntu 20.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement kernel from Ubuntu 20.04 LTS for Ubuntu 18.04 LTS. Maxim Levitsky and Paolo Bonzini discovered that the KVM hypervisor implementation for AMD processors in the Linux kernel allowed a guest VM to disable restrictions on VMLOAD/VMSAVE in a nested guest. An attacker in a guest VM could use this to read or write portions of the host&#39;s physical memory. Various other issues were also addressed.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/kernel">kernel</a>, <a href="/files/tags/vulnerability">vulnerability</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd>
<dd class="act-links"><a href="/files/download/164186/USN-5071-2.txt" title="Size: 3.6 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164186/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164186/Ubuntu-Security-Notice-USN-5071-2.html">View</span></a></dd>
</dl>
<dl id="F164185" class="file">
<dt><a class="ico text-plain" href="/files/164185/Library-Management-System-1.0-SQL-Injection.html" title="Size: 6.4 KB">Library Management System 1.0 SQL Injection</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-17/" title="15:56:21 UTC">Sep 17, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/14721/" class="person">Bobby Cooke</a>, <a href="/files/author/15899/" class="person">Adeeb Shah</a></dd>
<dd class="detail"><p>Library Management System version 1.0 suffers from a remote blind time-based SQL injection vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/sql_injection">sql injection</a></dd>
<dd class="act-links"><a href="/files/download/164185/lms10blind-sql.txt" title="Size: 6.4 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164185/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164185/Library-Management-System-1.0-SQL-Injection.html">View</span></a></dd>
</dl>
<dl id="F164184" class="file">
<dt><a class="ico text-plain" href="/files/164184/Ubuntu-Security-Notice-USN-5082-1.html" title="Size: 2.2 KB">Ubuntu Security Notice USN-5082-1</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-17/" title="15:54:51 UTC">Sep 17, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd>
<dd class="detail"><p>Ubuntu Security Notice 5082-1 - Maxim Levitsky and Paolo Bonzini discovered that the KVM hypervisor implementation for AMD processors in the Linux kernel allowed a guest VM to disable restrictions on VMLOAD/VMSAVE in a nested guest. An attacker in a guest VM could use this to read or write portions of the host&#39;s physical memory. Maxim Levitsky discovered that the KVM hypervisor implementation for AMD processors in the Linux kernel did not properly prevent a guest VM from enabling AVIC in nested guest VMs. An attacker in a guest VM could use this to write to portions of the host&#39;s physical memory. Various other issues were also addressed.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/kernel">kernel</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd>
<dd class="act-links"><a href="/files/download/164184/USN-5082-1.txt" title="Size: 2.2 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164184/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164184/Ubuntu-Security-Notice-USN-5082-1.html">View</span></a></dd>
</dl>
<dl id="F164183" class="file">
<dt><a class="ico text-plain" href="/files/164183/Cloudron-6.2-Cross-Site-Scripting.html" title="Size: 0.5 KB">Cloudron 6.2 Cross Site Scripting</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-17/" title="15:53:28 UTC">Sep 17, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/15174/" class="person">Akiner Kisa</a></dd>
<dd class="detail"><p>Cloudron version 6.2 suffers from a cross site scripting vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/xss">xss</a></dd>
<dd class="act-links"><a href="/files/download/164183/cloudron62-xss.txt" title="Size: 0.5 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164183/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164183/Cloudron-6.2-Cross-Site-Scripting.html">View</span></a></dd>
</dl>
<dl id="F164182" class="file">
<dt><a class="ico text-plain" href="/files/164182/Ubuntu-Security-Notice-USN-5080-2.html" title="Size: 1.1 KB">Ubuntu Security Notice USN-5080-2</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-17/" title="15:52:41 UTC">Sep 17, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd>
<dd class="detail"><p>Ubuntu Security Notice 5080-2 - USN-5080-1 fixed several vulnerabilities in Libgcrypt. This update provides the corresponding update for Ubuntu 16.04 ESM. It was discovered that Libgcrypt incorrectly handled ElGamal encryption. An attacker could possibly use this issue to recover sensitive information.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/vulnerability">vulnerability</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd>
<dd class="act-links"><a href="/files/download/164182/USN-5080-2.txt" title="Size: 1.1 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164182/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164182/Ubuntu-Security-Notice-USN-5080-2.html">View</span></a></dd>
</dl>
<dl id="F164181" class="file">
<dt><a class="ico text-plain" href="/files/164181/Simple-Attendance-System-1.0-SQL-Injection.html" title="Size: 1.1 KB">Simple Attendance System 1.0 SQL Injection</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-17/" title="15:51:26 UTC">Sep 17, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/15898/" class="person">Abdullah Khawaja</a></dd>
<dd class="detail"><p>Simple Attendance System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/sql_injection">sql injection</a></dd>
<dd class="act-links"><a href="/files/download/164181/simpleas10-sql.txt" title="Size: 1.1 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164181/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164181/Simple-Attendance-System-1.0-SQL-Injection.html">View</span></a></dd>
</dl>
<dl id="F164180" class="file">
<dt><a class="ico text-plain" href="/files/164180/Git-git-lfs-Remote-Code-Execution.html" title="Size: 6.9 KB">Git git-lfs Remote Code Execution</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-16/" title="16:16:41 UTC">Sep 16, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/7583/" class="person">Dawid Golunski</a>, <a href="/files/author/15682/" class="person">jheysel-r7</a>, <a href="/files/author/15897/" class="person">space-r7</a> | Site <a href="http://www.metasploit.com">metasploit.com</a></dd>
<dd class="detail"><p>This Metasploit modules exploits a critical vulnerability in Git Large File Storage (Git LFS), an open source Git extension for versioning large files, which allows attackers to achieve remote code execution if the Windows-using victim is tricked into cloning the attacker&#8217;s malicious repository using a vulnerable Git version control tool.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/code_execution">code execution</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/windows">windows</a></dd>
<dd class="act-links"><a href="/files/download/164180/git_lfs_rce.rb.txt" title="Size: 6.9 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164180/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164180/Git-git-lfs-Remote-Code-Execution.html">View</span></a></dd>
</dl>
<dl id="F164179" class="file">
<dt><a class="ico application-x-bzip2" href="/files/164179/GNU-Privacy-Guard-2.2.31.html" title="Size: 6.9 MB">GNU Privacy Guard 2.2.31</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-16/" title="16:14:10 UTC">Sep 16, 2021</a></dd>
<dd class="refer">Site <a href="http://www.gnupg.org">gnupg.org</a></dd>
<dd class="detail"><p>GnuPG (the GNU Privacy Guard or GPG) is GNU&#39;s tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. This is the LTS release.</p></dd>
<dd class="change"><span>Changes</span>: Over a dozen bug fixes. </dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/tool">tool</a>, <a href="/files/tags/encryption">encryption</a></dd>
<dd class="act-links"><a href="/files/download/164179/gnupg-2.2.31.tar.bz2" title="Size: 6.9 MB" rel="nofollow">Download</a>  | <a href="/files/favorite/164179/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164179/GNU-Privacy-Guard-2.2.31.html">View</span></a></dd>
</dl>
<dl id="F164178" class="file">
<dt><a class="ico text-plain" href="/files/164178/Red-Hat-Security-Advisory-2021-3555-01.html" title="Size: 5.5 KB">Red Hat Security Advisory 2021-3555-01</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-16/" title="16:11:46 UTC">Sep 16, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="person">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2021-3555-01 - Red Hat OpenShift Serverless Client kn 1.17.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.17.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. </p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/164178/RHSA-2021-3555-01.txt" title="Size: 5.5 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164178/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164178/Red-Hat-Security-Advisory-2021-3555-01.html">View</span></a></dd>
</dl>
<dl id="F164177" class="file">
<dt><a class="ico text-plain" href="/files/164177/Ubuntu-Security-Notice-USN-5080-1.html" title="Size: 1.3 KB">Ubuntu Security Notice USN-5080-1</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-16/" title="16:11:40 UTC">Sep 16, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd>
<dd class="detail"><p>Ubuntu Security Notice 5080-1 - It was discovered that Libgcrypt incorrectly handled ElGamal encryption. An attacker could possibly use this issue to recover sensitive information.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd>
<dd class="act-links"><a href="/files/download/164177/USN-5080-1.txt" title="Size: 1.3 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164177/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164177/Ubuntu-Security-Notice-USN-5080-1.html">View</span></a></dd>
</dl>
<dl id="F164176" class="file">
<dt><a class="ico text-plain" href="/files/164176/Ubuntu-Security-Notice-USN-5078-2.html" title="Size: 1.4 KB">Ubuntu Security Notice USN-5078-2</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-16/" title="16:11:34 UTC">Sep 16, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd>
<dd class="detail"><p>Ubuntu Security Notice 5078-2 - USN-5078-1 fixed several vulnerabilities in Squashfs-Tools. This update provides the corresponding update for Ubuntu 16.04 ESM. Etienne Stalmans discovered that Squashfs-Tools mishandled certain malformed SQUASHFS files. An attacker could use this vulnerability to write arbitrary files to the filesystem. Various other issues were also addressed.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/arbitrary">arbitrary</a>, <a href="/files/tags/vulnerability">vulnerability</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd>
<dd class="act-links"><a href="/files/download/164176/USN-5078-2.txt" title="Size: 1.4 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164176/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164176/Ubuntu-Security-Notice-USN-5078-2.html">View</span></a></dd>
</dl>
<dl id="F164175" class="file">
<dt><a class="ico text-plain" href="/files/164175/Microsoft-Windows-cmd.exe-Stack-Buffer-Overflow.html" title="Size: 7.2 KB">Microsoft Windows cmd.exe Stack Buffer Overflow</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-16/" title="16:09:53 UTC">Sep 16, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/11773/" class="person">hyp3rlinx</a> | Site <a href="http://hyp3rlinx.altervista.org">hyp3rlinx.altervista.org</a></dd>
<dd class="detail"><p>Microsoft Windows cmd.exe suffers from a stack buffer overflow vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/overflow">overflow</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/windows">windows</a></dd>
<dd class="act-links"><a href="/files/download/164175/MICROSOFT-WINDOWS-CMD.EXE-STACK-BUFFER-OVERFLOW.txt" title="Size: 7.2 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164175/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164175/Microsoft-Windows-cmd.exe-Stack-Buffer-Overflow.html">View</span></a></dd>
</dl>
<dl id="F164174" class="file">
<dt><a class="ico text-plain" href="/files/164174/Impress-CMS-1.4.2-Remote-Code-Execution.html" title="Size: 7 KB">Impress CMS 1.4.2 Remote Code Execution</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-16/" title="16:07:21 UTC">Sep 16, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/15840/" class="person">Halit Akaydin</a></dd>
<dd class="detail"><p>Impress CMS version 1.4.2 suffers from a remote code execution vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/code_execution">code execution</a></dd>
<dd class="act-links"><a href="/files/download/164174/impresscms142-exec.txt" title="Size: 7 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164174/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164174/Impress-CMS-1.4.2-Remote-Code-Execution.html">View</span></a></dd>
</dl>
<dl id="F164173" class="file">
<dt><a class="ico text-plain" href="/files/164173/elFinder-Archive-Command-Injection.html" title="Size: 6.1 KB">elFinder Archive Command Injection</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-15/" title="15:30:00 UTC">Sep 15, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/13699/" class="person">Shelby Pace</a>, <a href="/files/author/14009/" class="person">Thomas Chauchefoin</a> | Site <a href="http://www.metasploit.com">metasploit.com</a></dd>
<dd class="detail"><p>elFinder versions below 2.1.59 are vulnerable to a command injection vulnerability via its archive functionality. When creating a new zip archive, the name parameter is sanitized with the escapeshellarg() php function and then passed to the zip utility. Despite the sanitization, supplying the -TmTT argument as part of the name parameter is still permitted and enables the execution of arbitrary commands as the www-data user.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/arbitrary">arbitrary</a>, <a href="/files/tags/php">php</a></dd>
<dd class="act-links"><a href="/files/download/164173/elfinder_archive_cmd_injection.rb.txt" title="Size: 6.1 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164173/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164173/elFinder-Archive-Command-Injection.html">View</span></a></dd>
</dl>
<dl id="F164172" class="file">
<dt><a class="ico text-plain" href="/files/164172/Ubuntu-Security-Notice-USN-5079-2.html" title="Size: 1.9 KB">Ubuntu Security Notice USN-5079-2</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-15/" title="15:28:36 UTC">Sep 15, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd>
<dd class="detail"><p>Ubuntu Security Notice 5079-2 - USN-5079-1 fixed several vulnerabilities in curl. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Patrick Monnerat discovered that curl incorrectly handled upgrades to TLS. When receiving certain responses from servers, curl would continue without TLS even when the option to require a successful upgrade to TLS was specified. Patrick Monnerat discovered that curl incorrectly handled responses received before STARTTLS. A remote attacker could possibly use this issue to inject responses and intercept communications. Various other issues were also addressed.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/vulnerability">vulnerability</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd>
<dd class="act-links"><a href="/files/download/164172/USN-5079-2.txt" title="Size: 1.9 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164172/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164172/Ubuntu-Security-Notice-USN-5079-2.html">View</span></a></dd>
</dl>
<dl id="F164171" class="file">
<dt><a class="ico text-plain" href="/files/164171/Ubuntu-Security-Notice-USN-5079-1.html" title="Size: 2.3 KB">Ubuntu Security Notice USN-5079-1</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-15/" title="15:27:42 UTC">Sep 15, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd>
<dd class="detail"><p>Ubuntu Security Notice 5079-1 - It was discovered that curl incorrect handled memory when sending data to an MQTT server. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly execute arbitrary code. Patrick Monnerat discovered that curl incorrectly handled upgrades to TLS. When receiving certain responses from servers, curl would continue without TLS even when the option to require a successful upgrade to TLS was specified. Various other issues were also addressed.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/denial_of_service">denial of service</a>, <a href="/files/tags/arbitrary">arbitrary</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd>
<dd class="act-links"><a href="/files/download/164171/USN-5079-1.txt" title="Size: 2.3 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164171/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164171/Ubuntu-Security-Notice-USN-5079-1.html">View</span></a></dd>
</dl>
<dl id="F164170" class="file">
<dt><a class="ico text-plain" href="/files/164170/Red-Hat-Security-Advisory-2021-3548-01.html" title="Size: 11.3 KB">Red Hat Security Advisory 2021-3548-01</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-15/" title="15:27:27 UTC">Sep 15, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="person">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2021-3548-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. </p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/kernel">kernel</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/164170/RHSA-2021-3548-01.txt" title="Size: 11.3 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164170/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164170/Red-Hat-Security-Advisory-2021-3548-01.html">View</span></a></dd>
</dl>
<dl id="F164169" class="file">
<dt><a class="ico text-plain" href="/files/164169/Red-Hat-Security-Advisory-2021-3547-01.html" title="Size: 5.1 KB">Red Hat Security Advisory 2021-3547-01</a></dt>
<dd class="datetime">Posted <a href="/files/date/2021-09-15/" title="15:27:16 UTC">Sep 15, 2021</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="person">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2021-3547-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. </p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/kernel">kernel</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/164169/RHSA-2021-3547-01.txt" title="Size: 5.1 KB" rel="nofollow">Download</a>  | <a href="/files/favorite/164169/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/164169/Red-Hat-Security-Advisory-2021-3547-01.html">View</span></a></dd>
</dl>
</div>
<a id="files-home-next" href="/files/page2/" style="float:right; margin:10px 0;">View Older Files &rarr;</a>
</div>
    
    
     </div>
    
      <div id="adblock">
        
      </div>
      <div id="mn">
        <div class="mn-like-us">
<ul>
<li><a href="https://twitter.com/packet_storm"><img src="https://packetstatic.com/img1514015884/s_twitter.png" width="24" height="24" alt="Follow on Twitter" /> Follow us on Twitter</a></li>
<li><a href="https://www.facebook.com/packetstormfeed"><img src="https://packetstatic.com/img1514015884/s_facebook.png" width="24" height="24" alt="Follow on Facebook" /> Follow us on Facebook</a></li>
<li><a href="/feeds"><img src="https://packetstatic.com/img1514015884/s_rss.png" width="24" height="24" alt="View RSS Feeds" /> Subscribe to an RSS Feed</a></li>
</ul>
</div>

<div id="news-home">
<h2>Recent News</h2><a href="https://rss.packetstormsecurity.com/news/" class="rss-home"><img src="https://packetstatic.com/img1514015884/bt_rss.gif" width="16" height="16" alt="News RSS Feed" /></a><br />
<dl id="N32642" class="news first">
<dt><a href="/news/view/32642/Why-Government-Sites-Are-Hosting-Porn-And-Viagra-Ads.html">Why Government Sites Are Hosting Porn And Viagra Ads</a></dt>
<dd class="datetime">Posted <a href="/news/date/2021-09-16/" title="16:04:56 UTC">Sep 16, 2021</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/hacker">hacker</a>, <a href="/news/tags/government">government</a>, <a href="/news/tags/usa">usa</a>, <a href="/news/tags/military">military</a></dd>
<dd class="act-links"><a href="/news/favorite/32642/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.vice.com/en/article/pkb5qy/why-government-and-military-sites-are-hosting-porn-and-viagra-adsovernm">View</a>  </dd>
</dl>
<dl id="N32641" class="news">
<dt><a href="/news/view/32641/Google-Is-Backing-Security-Reviews-Of-These-Key-Open-Source-Projects.html">Google Is Backing Security Reviews Of These Key Open Source Projects</a></dt>
<dd class="datetime">Posted <a href="/news/date/2021-09-16/" title="16:04:52 UTC">Sep 16, 2021</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/google">google</a></dd>
<dd class="act-links"><a href="/news/favorite/32641/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.zdnet.com/article/google-is-backing-security-reviews-of-these-key-open-source-projects/">View</a>  </dd>
</dl>
<dl id="N32640" class="news">
<dt><a href="/news/view/32640/REvil-Sodinokibi-Ransomware-Universal-Decryptor-Key-Is-Out.html">REvil/Sodinokibi Ransomware Universal Decryptor Key Is Out</a></dt>
<dd class="datetime">Posted <a href="/news/date/2021-09-16/" title="16:04:49 UTC">Sep 16, 2021</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/hacker">hacker</a>, <a href="/news/tags/malware">malware</a>, <a href="/news/tags/cybercrime">cybercrime</a>, <a href="/news/tags/data_loss">data loss</a>, <a href="/news/tags/fraud">fraud</a>, <a href="/news/tags/cryptography">cryptography</a></dd>
<dd class="act-links"><a href="/news/favorite/32640/" class="fav" rel="nofollow">Favorite</a> | <a href="https://threatpost.com/revil-sodinokibi-ransomware-universal-decryptor/169498/">View</a>  </dd>
</dl>
<dl id="N32639" class="news">
<dt><a href="/news/view/32639/Azure-Zero-Day-Flaws-Highlight-Lurking-Supply-Chain-Risk.html">Azure Zero Day Flaws Highlight Lurking Supply Chain Risk</a></dt>
<dd class="datetime">Posted <a href="/news/date/2021-09-16/" title="16:04:45 UTC">Sep 16, 2021</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/microsoft">microsoft</a>, <a href="/news/tags/flaw">flaw</a>, <a href="/news/tags/zero_day">zero day</a></dd>
<dd class="act-links"><a href="/news/favorite/32639/" class="fav" rel="nofollow">Favorite</a> | <a href="https://threatpost.com/azure-zero-day-supply-chain/169508/">View</a>  </dd>
</dl>
<dl id="N32638" class="news">
<dt><a href="/news/view/32638/House-Committee-Tees-Up-New-FTC-Data-Security-Bureau.html">House Committee Tees Up New FTC Data Security Bureau</a></dt>
<dd class="datetime">Posted <a href="/news/date/2021-09-15/" title="15:05:53 UTC">Sep 15, 2021</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/government">government</a>, <a href="/news/tags/usa">usa</a></dd>
<dd class="act-links"><a href="/news/favorite/32638/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.scmagazine.com/analysis/data-security/house-committee-tees-up-new-ftc-data-security-bureau">View</a>  </dd>
</dl>
<dl id="N32637" class="news">
<dt><a href="/news/view/32637/Unsecured-Fitness-App-Database-Leaks-61M-Records.html">Unsecured Fitness App Database Leaks 61M Records</a></dt>
<dd class="datetime">Posted <a href="/news/date/2021-09-15/" title="15:05:48 UTC">Sep 15, 2021</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/privacy">privacy</a>, <a href="/news/tags/database">database</a>, <a href="/news/tags/data_loss">data loss</a></dd>
<dd class="act-links"><a href="/news/favorite/32637/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.scmagazine.com/analysis/application-security/unsecured-fitness-app-database-leaks-61m-records-highlights-health-app-privacy-risks">View</a>  </dd>
</dl>
<dl id="N32636" class="news">
<dt><a href="/news/view/32636/DOJ-Fines-NSA-Hackers-Who-Assisted-UAE-In-Attacks-On-Dissidents.html">DOJ Fines NSA Hackers Who Assisted UAE In Attacks On Dissidents</a></dt>
<dd class="datetime">Posted <a href="/news/date/2021-09-15/" title="15:05:44 UTC">Sep 15, 2021</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/government">government</a>, <a href="/news/tags/privacy">privacy</a>, <a href="/news/tags/usa">usa</a>, <a href="/news/tags/cyberwar">cyberwar</a>, <a href="/news/tags/spyware">spyware</a>, <a href="/news/tags/nsa">nsa</a></dd>
<dd class="act-links"><a href="/news/favorite/32636/" class="fav" rel="nofollow">Favorite</a> | <a href="https://www.zdnet.com/article/doj-fines-nsa-hackers-who-assisted-uae-in-attacks-on-dissidents/">View</a>  </dd>
</dl>
<dl id="N32635" class="news">
<dt><a href="/news/view/32635/Anonyous-Claims-To-Have-Stolen-Huge-Trove-Of-Data-From-Epik.html">Anonyous Claims To Have Stolen Huge Trove Of Data From Epik</a></dt>
<dd class="datetime">Posted <a href="/news/date/2021-09-15/" title="15:05:40 UTC">Sep 15, 2021</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/government">government</a>, <a href="/news/tags/data_loss">data loss</a>, <a href="/news/tags/cyberwar">cyberwar</a>, <a href="/news/tags/anonymous">anonymous</a></dd>
<dd class="act-links"><a href="/news/favorite/32635/" class="fav" rel="nofollow">Favorite</a> | <a href="https://gizmodo.com/anonymous-claims-to-have-stolen-huge-trove-of-data-from-1847673935">View</a>  </dd>
</dl>
<dl id="N32634" class="news">
<dt><a href="/news/view/32634/Pair-Of-Google-Chrome-Zero-Day-Bugs-Actively-Exploited.html">Pair Of Google Chrome Zero Day Bugs Actively Exploited</a></dt>
<dd class="datetime">Posted <a href="/news/date/2021-09-14/" title="15:29:00 UTC">Sep 14, 2021</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/hacker">hacker</a>, <a href="/news/tags/flaw">flaw</a>, <a href="/news/tags/google">google</a>, <a href="/news/tags/zero_day">zero day</a>, <a href="/news/tags/chrome">chrome</a></dd>
<dd class="act-links"><a href="/news/favorite/32634/" class="fav" rel="nofollow">Favorite</a> | <a href="https://threatpost.com/google-chrome-zero-day-exploited/169442/">View</a>  </dd>
</dl>
<dl id="N32633" class="news">
<dt><a href="/news/view/32633/Wiz-Discovers-Another-Major-Azure-Vulnerability.html">Wiz Discovers Another Major Azure Vulnerability</a></dt>
<dd class="datetime">Posted <a href="/news/date/2021-09-14/" title="15:28:56 UTC">Sep 14, 2021</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/hacker">hacker</a>, <a href="/news/tags/data_loss">data loss</a>, <a href="/news/tags/flaw">flaw</a></dd>
<dd class="act-links"><a href="/news/favorite/32633/" class="fav" rel="nofollow">Favorite</a> | <a href="https://arstechnica.com/information-technology/2021/09/security-researchers-at-wiz-discover-another-major-azure-vulnerability/">View</a>  </dd>
</dl>

<a href="/news/" style="float:right; margin:10px 0;">View More News &rarr;</a>
</div>
<div>
<form id="cal" action="/files/cal/" method="get">
<h2>File Archive:</h2><h3>September 2021</h3>
<button id="cal-prev" name="cal-prev" type="button" value="2021-9"><span>&lt;</span></button><ul class="dotw"><li>Su</li><li>Mo</li><li>Tu</li><li>We</li><li>Th</li><li>Fr</li><li>Sa</li></ul>
<ul><li></li><li></li><li></li><li class="low"><a href="/files/date/2021-09-01/">1</a><div class="stats"><div class="point"></div><div class="date">Sep 1st</div><div class="count">14 Files</div></div></li><li class="med"><a href="/files/date/2021-09-02/">2</a><div class="stats"><div class="point"></div><div class="date">Sep 2nd</div><div class="count">19 Files</div></div></li><li class="low"><a href="/files/date/2021-09-03/">3</a><div class="stats"><div class="point"></div><div class="date">Sep 3rd</div><div class="count">9 Files</div></div></li><li class="low"><a href="/files/date/2021-09-04/">4</a><div class="stats"><div class="point"></div><div class="date">Sep 4th</div><div class="count">1 Files</div></div></li></ul>
<ul><li class="low"><a href="/files/date/2021-09-05/">5</a><div class="stats"><div class="point"></div><div class="date">Sep 5th</div><div class="count">2 Files</div></div></li><li class="low"><a href="/files/date/2021-09-06/">6</a><div class="stats"><div class="point"></div><div class="date">Sep 6th</div><div class="count">3 Files</div></div></li><li class="low"><a href="/files/date/2021-09-07/">7</a><div class="stats"><div class="point"></div><div class="date">Sep 7th</div><div class="count">12 Files</div></div></li><li class="med"><a href="/files/date/2021-09-08/">8</a><div class="stats"><div class="point"></div><div class="date">Sep 8th</div><div class="count">22 Files</div></div></li><li class="med"><a href="/files/date/2021-09-09/">9</a><div class="stats"><div class="point"></div><div class="date">Sep 9th</div><div class="count">17 Files</div></div></li><li class="med"><a href="/files/date/2021-09-10/">10</a><div class="stats"><div class="point"></div><div class="date">Sep 10th</div><div class="count">19 Files</div></div></li><li class="low"><a href="/files/date/2021-09-11/">11</a><div class="stats"><div class="point"></div><div class="date">Sep 11th</div><div class="count">3 Files</div></div></li></ul>
<ul><li class="low"><a href="/files/date/2021-09-12/">12</a><div class="stats"><div class="point"></div><div class="date">Sep 12th</div><div class="count">2 Files</div></div></li><li class="med"><a href="/files/date/2021-09-13/">13</a><div class="stats"><div class="point"></div><div class="date">Sep 13th</div><div class="count">15 Files</div></div></li><li class="med"><a href="/files/date/2021-09-14/">14</a><div class="stats"><div class="point"></div><div class="date">Sep 14th</div><div class="count">16 Files</div></div></li><li class="med"><a href="/files/date/2021-09-15/">15</a><div class="stats"><div class="point"></div><div class="date">Sep 15th</div><div class="count">15 Files</div></div></li><li class="low"><a href="/files/date/2021-09-16/">16</a><div class="stats"><div class="point"></div><div class="date">Sep 16th</div><div class="count">7 Files</div></div></li><li class="low"><a href="/files/date/2021-09-17/">17</a><div class="stats"><div class="point"></div><div class="date">Sep 17th</div><div class="count">13 Files</div></div></li><li class="none today"><a href="/files/date/2021-09-18/">18</a><div class="stats"><div class="point"></div><div class="date">Sep 18th</div><div class="count">0 Files</div></div></li></ul>
<ul><li class="none"><a href="/files/date/2021-09-19/">19</a><div class="stats"><div class="point"></div><div class="date">Sep 19th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2021-09-20/">20</a><div class="stats"><div class="point"></div><div class="date">Sep 20th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2021-09-21/">21</a><div class="stats"><div class="point"></div><div class="date">Sep 21st</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2021-09-22/">22</a><div class="stats"><div class="point"></div><div class="date">Sep 22nd</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2021-09-23/">23</a><div class="stats"><div class="point"></div><div class="date">Sep 23rd</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2021-09-24/">24</a><div class="stats"><div class="point"></div><div class="date">Sep 24th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2021-09-25/">25</a><div class="stats"><div class="point"></div><div class="date">Sep 25th</div><div class="count">0 Files</div></div></li></ul>
<ul><li class="none"><a href="/files/date/2021-09-26/">26</a><div class="stats"><div class="point"></div><div class="date">Sep 26th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2021-09-27/">27</a><div class="stats"><div class="point"></div><div class="date">Sep 27th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2021-09-28/">28</a><div class="stats"><div class="point"></div><div class="date">Sep 28th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2021-09-29/">29</a><div class="stats"><div class="point"></div><div class="date">Sep 29th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2021-09-30/">30</a><div class="stats"><div class="point"></div><div class="date">Sep 30th</div><div class="count">0 Files</div></div></li><li></li><li></li></ul>
</form></div>
<div id="mn-top-author" class="top-ten">
<h2>Top Authors In Last 30 Days</h2>
<ul>
<li><a href="/files/authors/4676">Red Hat</a> <span>98 files</span></li>
<li><a href="/files/authors/3695">Ubuntu</a> <span>46 files</span></li>
<li><a href="/files/authors/15382">malvuln</a> <span>22 files</span></li>
<li><a href="/files/authors/15893">Neurogenesia</a> <span>13 files</span></li>
<li><a href="/files/authors/14758">nu11secur1ty</a> <span>6 files</span></li>
<li><a href="/files/authors/15876">tfsec</a> <span>5 files</span></li>
<li><a href="/files/authors/15877">xiao13</a> <span>5 files</span></li>
<li><a href="/files/authors/15256">icekam</a> <span>5 files</span></li>
<li><a href="/files/authors/15875">Rainbow</a> <span>5 files</span></li>
<li><a href="/files/authors/15832">Aryan Chehreghani</a> <span>4 files</span></li>
</ul>
</div>
<div id="mn-tag-file"><h2>File Tags</h2><ul><li><a href="/files/tags/activex/">ActiveX</a> <span>(930)</span></li><li><a href="/files/tags/advisory/">Advisory</a> <span>(75,871)</span></li><li><a href="/files/tags/arbitrary/">Arbitrary</a> <span>(14,818)</span></li><li><a href="/files/tags/bbs/">BBS</a> <span>(2,859)</span></li><li><a href="/files/tags/bypass/">Bypass</a> <span>(1,468)</span></li><li><a href="/files/tags/cgi/">CGI</a> <span>(1,007)</span></li><li><a href="/files/tags/code_execution/">Code Execution</a> <span>(6,286)</span></li><li><a href="/files/tags/conference/">Conference</a> <span>(659)</span></li><li><a href="/files/tags/cracker/">Cracker</a> <span>(793)</span></li><li><a href="/files/tags/csrf/">CSRF</a> <span>(3,223)</span></li><li><a href="/files/tags/denial_of_service/">DoS</a> <span>(21,309)</span></li><li><a href="/files/tags/encryption/">Encryption</a> <span>(2,311)</span></li><li><a href="/files/tags/exploit/">Exploit</a> <span>(48,459)</span></li><li><a href="/files/tags/file_inclusion/">File Inclusion</a> <span>(4,104)</span></li><li><a href="/files/tags/file_upload/">File Upload</a> <span>(924)</span></li><li><a href="/files/tags/firewall/">Firewall</a> <span>(821)</span></li><li><a href="/files/tags/info_disclosure/">Info Disclosure</a> <span>(2,516)</span></li><li><a href="/files/tags/intrusion_detection/">Intrusion Detection</a> <span>(837)</span></li><li><a href="/files/tags/java/">Java</a> <span>(2,672)</span></li><li><a href="/files/tags/javascript/">JavaScript</a> <span>(776)</span></li><li><a href="/files/tags/kernel/">Kernel</a> <span>(5,793)</span></li><li><a href="/files/tags/local/">Local</a> <span>(13,818)</span></li><li><a href="/files/tags/magazine/">Magazine</a> <span>(585)</span></li><li><a href="/files/tags/overflow/">Overflow</a> <span>(11,883)</span></li><li><a href="/files/tags/perl/">Perl</a> <span>(1,408)</span></li><li><a href="/files/tags/php/">PHP</a> <span>(5,004)</span></li><li><a href="/files/tags/proof_of_concept/">Proof of Concept</a> <span>(2,267)</span></li><li><a href="/files/tags/protocol/">Protocol</a> <span>(3,175)</span></li><li><a href="/files/tags/python/">Python</a> <span>(1,340)</span></li><li><a href="/files/tags/remote/">Remote</a> <span>(29,058)</span></li><li><a href="/files/tags/root/">Root</a> <span>(3,400)</span></li><li><a href="/files/tags/ruby/">Ruby</a> <span>(561)</span></li><li><a href="/files/tags/scanner/">Scanner</a> <span>(1,620)</span></li><li><a href="/files/tags/tool/">Security Tool</a> <span>(7,571)</span></li><li><a href="/files/tags/shell/">Shell</a> <span>(2,969)</span></li><li><a href="/files/tags/shellcode/">Shellcode</a> <span>(1,190)</span></li><li><a href="/files/tags/sniffer/">Sniffer</a> <span>(873)</span></li><li><a href="/files/tags/spoof/">Spoof</a> <span>(2,016)</span></li><li><a href="/files/tags/sql_injection/">SQL Injection</a> <span>(15,752)</span></li><li><a href="/files/tags/tcp/">TCP</a> <span>(2,343)</span></li><li><a href="/files/tags/trojan/">Trojan</a> <span>(651)</span></li><li><a href="/files/tags/udp/">UDP</a> <span>(863)</span></li><li><a href="/files/tags/virus/">Virus</a> <span>(652)</span></li><li><a href="/files/tags/vulnerability/">Vulnerability</a> <span>(29,843)</span></li><li><a href="/files/tags/web/">Web</a> <span>(8,733)</span></li><li><a href="/files/tags/paper/">Whitepaper</a> <span>(3,664)</span></li><li><a href="/files/tags/x86/">x86</a> <span>(937)</span></li><li><a href="/files/tags/xss/">XSS</a> <span>(17,070)</span></li><li><a href="/files/tags/">Other</a></li></ul></div><div id="mn-arch-file"><h2>File Archives</h2><ul><li><a href="/files/date/2021-09/">September 2021</a></li><li><a href="/files/date/2021-08/">August 2021</a></li><li><a href="/files/date/2021-07/">July 2021</a></li><li><a href="/files/date/2021-06/">June 2021</a></li><li><a href="/files/date/2021-05/">May 2021</a></li><li><a href="/files/date/2021-04/">April 2021</a></li><li><a href="/files/date/2021-03/">March 2021</a></li><li><a href="/files/date/2021-02/">February 2021</a></li><li><a href="/files/date/2021-01/">January 2021</a></li><li><a href="/files/date/2020-12/">December 2020</a></li><li><a href="/files/date/2020-11/">November 2020</a></li><li><a href="/files/date/2020-10/">October 2020</a></li><li><a href="/files/date/">Older</a></li></ul></div><div id="mn-os-file"><h2>Systems</h2><ul><li><a href="/files/os/aix/">AIX</a> <span>(423)</span></li><li><a href="/files/os/apple/">Apple</a> <span>(1,811)</span></li><li><a href="/files/os/bsd/">BSD</a> <span>(368)</span></li><li><a href="/files/os/centos/">CentOS</a> <span>(54)</span></li><li><a href="/files/os/cisco/">Cisco</a> <span>(1,907)</span></li><li><a href="/files/os/debian/">Debian</a> <span>(5,946)</span></li><li><a href="/files/os/fedora/">Fedora</a> <span>(1,690)</span></li><li><a href="/files/os/freebsd/">FreeBSD</a> <span>(1,241)</span></li><li><a href="/files/os/gentoo/">Gentoo</a> <span>(4,148)</span></li><li><a href="/files/os/hpux/">HPUX</a> <span>(875)</span></li><li><a href="/files/os/ios/">iOS</a> <span>(295)</span></li><li><a href="/files/os/iphone/">iPhone</a> <span>(108)</span></li><li><a href="/files/os/irix/">IRIX</a> <span>(220)</span></li><li><a href="/files/os/juniper/">Juniper</a> <span>(67)</span></li><li><a href="/files/os/linux/">Linux</a> <span>(40,642)</span></li><li><a href="/files/os/osx/">Mac OS X</a> <span>(681)</span></li><li><a href="/files/os/mandriva/">Mandriva</a> <span>(3,105)</span></li><li><a href="/files/os/netbsd/">NetBSD</a> <span>(255)</span></li><li><a href="/files/os/openbsd/">OpenBSD</a> <span>(475)</span></li><li><a href="/files/os/redhat/">RedHat</a> <span>(10,451)</span></li><li><a href="/files/os/slackware/">Slackware</a> <span>(941)</span></li><li><a href="/files/os/solaris/">Solaris</a> <span>(1,601)</span></li><li><a href="/files/os/suse/">SUSE</a> <span>(1,444)</span></li><li><a href="/files/os/ubuntu/">Ubuntu</a> <span>(7,413)</span></li><li><a href="/files/os/unix/">UNIX</a> <span>(8,956)</span></li><li><a href="/files/os/unixware/">UnixWare</a> <span>(182)</span></li><li><a href="/files/os/windows/">Windows</a> <span>(6,109)</span></li><li><a href="/files/os/">Other</a></li></ul></div><div id="mn-tag-news"><h2>News Tags</h2><ul><li><a href="/news/tags/zero_day/">0 Day</a> <span>(203)</span></li><li><a href="/news/tags/adobe/">Adobe</a> <span>(299)</span></li><li><a href="/news/tags/anonymous/">Anonymous</a> <span>(344)</span></li><li><a href="/news/tags/apple/">Apple</a> <span>(914)</span></li><li><a href="/news/tags/backdoor/">Backdoor</a> <span>(502)</span></li><li><a href="/news/tags/bank/">Bank</a> <span>(1,075)</span></li><li><a href="/news/tags/botnet/">Botnet</a> <span>(457)</span></li><li><a href="/news/tags/britain/">Britain</a> <span>(978)</span></li><li><a href="/news/tags/china/">China</a> <span>(742)</span></li><li><a href="/news/tags/conference/">Conference</a> <span>(291)</span></li><li><a href="/news/tags/cryptography/">Cryptography</a> <span>(1,003)</span></li><li><a href="/news/tags/cybercrime/">Cybercrime</a> <span>(1,706)</span></li><li><a href="/news/tags/cyberwar/">Cyberwar</a> <span>(1,417)</span></li><li><a href="/news/tags/data_loss/">Data Loss</a> <span>(3,121)</span></li><li><a href="/news/tags/database/">Database</a> <span>(211)</span></li><li><a href="/news/tags/denial_of_service/">DoS</a> <span>(429)</span></li><li><a href="/news/tags/email/">Email</a> <span>(437)</span></li><li><a href="/news/tags/facebook/">Facebook</a> <span>(743)</span></li><li><a href="/news/tags/fbi/">FBI</a> <span>(379)</span></li><li><a href="/news/tags/flaw/">Flaw</a> <span>(3,484)</span></li><li><a href="/news/tags/fraud/">Fraud</a> <span>(2,144)</span></li><li><a href="/news/tags/google/">Google</a> <span>(1,358)</span></li><li><a href="/news/tags/government/">Government</a> <span>(5,840)</span></li><li><a href="/news/tags/hacker/">Hacker</a> <span>(6,044)</span></li><li><a href="/news/tags/headline/">Headline</a> <span>(16,218)</span></li><li><a href="/news/tags/linux/">Linux</a> <span>(205)</span></li><li><a href="/news/tags/malware/">Malware</a> <span>(2,039)</span></li><li><a href="/news/tags/microsoft/">Microsoft</a> <span>(1,555)</span></li><li><a href="/news/tags/mozilla/">Mozilla</a> <span>(202)</span></li><li><a href="/news/tags/nsa/">NSA</a> <span>(656)</span></li><li><a href="/news/tags/password/">Password</a> <span>(596)</span></li><li><a href="/news/tags/patch/">Patch</a> <span>(763)</span></li><li><a href="/news/tags/phish/">Phish</a> <span>(299)</span></li><li><a href="/news/tags/phone/">Phone</a> <span>(1,643)</span></li><li><a href="/news/tags/privacy/">Privacy</a> <span>(3,990)</span></li><li><a href="/news/tags/russia/">Russia</a> <span>(796)</span></li><li><a href="/news/tags/scam/">Scam</a> <span>(273)</span></li><li><a href="/news/tags/science/">Science</a> <span>(414)</span></li><li><a href="/news/tags/social/">Social</a> <span>(396)</span></li><li><a href="/news/tags/space/">Space</a> <span>(222)</span></li><li><a href="/news/tags/spam/">Spam</a> <span>(369)</span></li><li><a href="/news/tags/spyware/">Spyware</a> <span>(1,252)</span></li><li><a href="/news/tags/terror/">Terror</a> <span>(364)</span></li><li><a href="/news/tags/trojan/">Trojan</a> <span>(300)</span></li><li><a href="/news/tags/twitter/">Twitter</a> <span>(335)</span></li><li><a href="/news/tags/usa/">USA</a> <span>(3,289)</span></li><li><a href="/news/tags/virus/">Virus</a> <span>(392)</span></li><li><a href="/news/tags/wireless/">Wireless</a> <span>(214)</span></li><li><a href="/news/tags/">Other</a></li></ul></div><div id="mn-arch-news"><h2>News Archives</h2><ul><li><a href="/news/date/2021-09/">September 2021</a></li><li><a href="/news/date/2021-08/">August 2021</a></li><li><a href="/news/date/2021-07/">July 2021</a></li><li><a href="/news/date/2021-06/">June 2021</a></li><li><a href="/news/date/2021-05/">May 2021</a></li><li><a href="/news/date/2021-04/">April 2021</a></li><li><a href="/news/date/2021-03/">March 2021</a></li><li><a href="/news/date/2021-02/">February 2021</a></li><li><a href="/news/date/2021-01/">January 2021</a></li><li><a href="/news/date/2020-12/">December 2020</a></li><li><a href="/news/date/2020-11/">November 2020</a></li><li><a href="/news/date/2020-10/">October 2020</a></li><li><a href="/news/date/">Older</a></li></ul></div>
      </div>

  </div>

</div>

<div id="f">
  <div id="fc">

    <div class="f-box" style="margin: 50px 0 0 0;">
        <a href="/"><img src="https://packetstatic.com/img1514015884/ps_logo.png" width="218" alt="packet storm" /></a>
    <p class="copy">&copy; 2020 Packet Storm. All rights reserved.</p>
    </div>

    <div class="f-box">
    <dl>
      <dt>Site Links</dt>
      <dd><a href="/news/date/">News by Month</a></dd>
      <dd><a href="/news/tags/">News Tags</a></dd>
      <dd><a href="/files/date/">Files by Month</a></dd>
      <dd><a href="/files/tags/">File Tags</a></dd>
      <dd><a href="/files/directory/">File Directory</a></dd>
    </dl>    
    </div>

    <div class="f-box">
    <dl>
      <dt>About Us</dt>
      <dd><a href="/about/">History &amp; Purpose</a></dd>
      <dd><a href="/contact/">Contact Information</a></dd>
      <dd><a href="/legal/tos.html">Terms of Service</a></dd>
      <dd><a href="/legal/privacy.html">Privacy Statement</a></dd>
      <dd><a href="/legal/copyright.html">Copyright Information</a></dd>
    </dl>
    </div>

    <div class="f-box">
	<dl>
      <dt>Services</dt>
      <dd><a href="/services/">Security Services</a></dd>
      <dt style="margin-top:1.5em;">Hosting By</dt>
      <dd><a href="http://www.rokasecurity.com/">Rokasec</a></dd>
    </dl>   
    </div>
    <div class="f-box">
    <ul class="f-follow">
     <li><a href="https://twitter.com/packet_storm"><img width="24" height="24" alt="Follow on Twitter" src="https://packetstatic.com/img1514015884/s_twitter.png" /> Follow us on Twitter</a></li>
     <li><a href="https://www.facebook.com/packetstormfeed"><img width="24" height="24" alt="Follow on Facebook" src="https://packetstatic.com/img1514015884/s_facebook.png" /> Follow us on Facebook</a></li>
     <li><a href="/feeds"><img width="24" height="24" alt="View RSS Feeds" src="https://packetstatic.com/img1514015884/s_rss.png" /> Subscribe to an RSS Feed</a></li>
    </ul>
    </div>

  </div>
</div>

<div id="o-box"><img src="https://packetstatic.com/img1514015884/o_close.png" alt="close" height="30" width="30" id="o-close" /><div id="o-main"></div></div>


<script type="text/javascript"> var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-18885198-1']); _gaq.push (['_gat._anonymizeIp']); _gaq.push(['_setDomainName', '.packetstormsecurity.com']); _gaq.push(['_trackPageview']); (function() {var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.googleanalytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s);})(); </script><noscript><img src="https://ssl.google-analytics.com/__utm.gif?utmwv=1.3&amp;utmn=1354465934&amp;utmcs=ISO-8859-1&amp;utmsr=31337x31337&amp;utmsc=32-bit&amp;utmul=en-us&amp;utmje=0&amp;utmfl=-&amp;utmcn=1&amp;utmdt=%u2248%20Packet%20Storm&amp;utmhn=packetstormsecurity.com&amp;utmr=-&amp;utmp=%2F&amp;utmac=UA-18885198-1&amp;utmcc=__utma%3D32867617.1354465934.1631982680.1631982680.1631982680.1%3B%2B__utmz%3D32867617.1631982680.1.1.utmccn%3D(direct)%7Cutmcsr%3D(direct)%7Cutmcmd%3D(none)" width="2" height="2" alt="" /></noscript>
<!-- Sat, 18 Sep 2021 16:31:20 GMT -->
</body>
</html>

Resolver

Resolver ASN
AS54825
Resolver IP
147.75.101.85
Resolver Network Name
Packet Host, Inc.
Measurement UID
20210918162408.583132_IR_webconnectivity_701df4850da81c48
Report ID
20210918T160508Z_webconnectivity_IR_44244_n1_0cHdHgJpRFj9rM0k
Platform
windows
Software Name
ooniprobe-desktop-unattended (3.10.0-beta.3)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)

Raw Measurement Data

Loading…