science and technology

Penitent Romanian Hacker Aims To Protect World's ATMs














science and technology

PhreeBooks ERP 5.2.5 Remote Command Execution

PhreeBooks ERP version 5.2.5 suffers from a remote command execution vulnerability.




science and technology

Kentico CMS 12.0.14 Remote Command Execution

This Metasploit module exploits a vulnerability in the Kentico CMS platform versions 12.0.14 and earlier. Remote command execution is possible via unauthenticated XML requests to the Staging Service SyncServer.asmx interface ProcessSynchronizationTaskData method stagingTaskData parameter. XML input is passed to an insecure .NET deserialize call which allows for remote command execution.




science and technology

UPLoad 7.0 Insecure Cookie Handling

UPLoad version 7.0 suffers from an insecure cookie handling vulnerability.




science and technology

Ac4p.com Gallery 1.0 Cross Site Scripting / Shell Upload / Bypass / Disclosure

Ac4p.com Gallery version 1.0 suffers from cross site scripting, phpinfo disclosure, shell upload, and insecure cookie handling vulnerabilities.




science and technology

Newbie CMS Insecure Cookie Handling

Newbie CMS suffers from an insecure cookie handling vulnerability.




science and technology

CuteNews 1.4.6 Insecure Cookie Handling

CuteNews version 1.4.6 suffers from an insecure cookie handling vulnerability.




science and technology

Islamic Voice Insecure Cookie Handling

Islamic Voice suffers from an insecure cookie handling vulnerability.




science and technology

Denapars Shop Script Bypass / Insecure Cookie / Shell Upload

Denapars Shop Script suffers from administrative bypass, shell upload, and insecure cookie handling vulnerabilities.




science and technology

velBox 1.2 Insecure Cookie Handling

velBox version 1.2 suffers from an insecure cookie handling vulnerability.




science and technology

Memorial Web Site Script Password Reset / Insecure Cookie

Memorial Web Site Script suffers from password reset and insecure cookie handling vulnerabilities.




science and technology

[whem]-UPLoad 7.0 Insecure Cookie

[whem]-UPLoad version 7.0 suffers from an insecure cookie handling vulnerability.




science and technology

My Book Insecure Cookie Handling

My Book suffers from an insecure cookie handling vulnerability.




science and technology

AV Arcade 3 Insecure Cookie / SQL Injection

AV Arcade version 3 suffers from insecure cookie and SQL injection vulnerabilities.




science and technology

Open Cart 0.6.5 Insecure Cookie

Open Cart version 0.6.5 suffers from an insecure cookie handling vulnerability.




science and technology

Tornado 1.0 Insecure Cookie

Tornado version 1.0 suffers from an insecure cookie vulnerability.




science and technology

Aleza Portal 1.6 Insecure Cookie

Aleza Portal version 1.6 suffers from an insecure cookie handling vulnerability that allows for SQL injection.




science and technology

xWeblog 2.2 Insecure Cookie Handling

xWeblog version 2.2 suffers from an insecure cookie handling vulnerability.




science and technology

PHP Hosting Directory 2.0 Insecure Cookie

PHP Hosting Directory version 2.0 suffers from an insecure cookie vulnerability that allows for administrative bypass.




science and technology

WikiWebHelp 0.3.3 Insecure Cookie Handling

WikiWebHelp version 0.3.3 suffers from an insecure cookie handling vulnerability.




science and technology

Babil CMS Insecure Cookie Handling

Babil CMS suffers from an insecure cookie handling vulnerability.




science and technology

web.go Insecure Cookie

web.go suffers from an insecure cookie vulnerability. Their cookie is modeled after Tornado which had the same issue reported on in 2010.




science and technology

PHPDirector 0.30 Insecure Cookie Handling

PHPDirector version 0.30 suffers from an insecure cookie handling vulnerability that allows for privilege escalation.




science and technology

AV Arcade Pro 5.4.3 Cookie Manipulation

AV Arcade Pro version 5.4.3 suffers from an insecure cookie vulnerability that allows for access bypass.




science and technology

Paddelberg Topsite Script Insecure Cookie

Paddelberg Topsite Script version 1.2.3 suffers from an authentication bypass vulnerability due to insecure cookie handling.




science and technology

NICE Recording eXpress 6.x Root Backdoor / XSS / Bypass

NICE Recording eXpress versions 6.0.x, 6.1.x, 6.2.x, 6.3.x, and 6.5.x suffer from cross site scripting, root backdoor, unauthenticated access, fail authorization, insecure cookie handling, and remote SQL injection vulnerabilities.




science and technology

ResourceSpace 6.4.5976 XSS / SQL Injection / Insecure Cookie Handling

ResourceSpace suffers from cross site scripting, html injection, insecure cookie handling, and remote SQL injection vulnerabilities. Versions 6.4.5976 and below are affected.




science and technology

Totaljs CMS 12.0 Insecure Admin Session Cookie

Totaljs CMS version 12.0 mints an insecure cookie that can be used to crack the administrator password.




science and technology

Red Hat Security Advisory 2020-1975-01

Red Hat Security Advisory 2020-1975-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability.




science and technology

Red Hat Security Advisory 2020-1979-01

Red Hat Security Advisory 2020-1979-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability.




science and technology

Red Hat Security Advisory 2020-1978-01

Red Hat Security Advisory 2020-1978-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability.




science and technology

Red Hat Security Advisory 2020-1980-01

Red Hat Security Advisory 2020-1980-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability.




science and technology

Red Hat Security Advisory 2020-1422-01

Red Hat Security Advisory 2020-1422-01 - This release of Red Hat build of Eclipse Vert.x 3.9.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section.




science and technology

Latest Symantec CEO's 'Revolution' Could Axe 1,000 Jobs