0 [whem]-UPLoad 7.0 Insecure Cookie By packetstormsecurity.com Published On :: Wed, 23 Jun 2010 05:19:38 GMT [whem]-UPLoad version 7.0 suffers from an insecure cookie handling vulnerability. Full Article
0 Open Cart 0.6.5 Insecure Cookie By packetstormsecurity.com Published On :: Sat, 07 Aug 2010 15:46:38 GMT Open Cart version 0.6.5 suffers from an insecure cookie handling vulnerability. Full Article
0 Tornado 1.0 Insecure Cookie By packetstormsecurity.com Published On :: Tue, 17 Aug 2010 01:14:15 GMT Tornado version 1.0 suffers from an insecure cookie vulnerability. Full Article
0 PHP Hosting Directory 2.0 Insecure Cookie By packetstormsecurity.com Published On :: Mon, 11 Oct 2010 01:03:08 GMT PHP Hosting Directory version 2.0 suffers from an insecure cookie vulnerability that allows for administrative bypass. Full Article
0 WikiWebHelp 0.3.3 Insecure Cookie Handling By packetstormsecurity.com Published On :: Sun, 17 Oct 2010 22:31:47 GMT WikiWebHelp version 0.3.3 suffers from an insecure cookie handling vulnerability. Full Article
0 PHPDirector 0.30 Insecure Cookie Handling By packetstormsecurity.com Published On :: Wed, 27 Apr 2011 17:11:11 GMT PHPDirector version 0.30 suffers from an insecure cookie handling vulnerability that allows for privilege escalation. Full Article
0 Totaljs CMS 12.0 Insecure Admin Session Cookie By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 23:20:22 GMT Totaljs CMS version 12.0 mints an insecure cookie that can be used to crack the administrator password. Full Article
0 Red Hat Security Advisory 2020-1975-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:37 GMT Red Hat Security Advisory 2020-1975-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
0 Red Hat Security Advisory 2020-1979-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:52 GMT Red Hat Security Advisory 2020-1979-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
0 Red Hat Security Advisory 2020-1978-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:05 GMT Red Hat Security Advisory 2020-1978-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
0 Red Hat Security Advisory 2020-1980-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:13 GMT Red Hat Security Advisory 2020-1980-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
0 Red Hat Security Advisory 2020-1422-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:30 GMT Red Hat Security Advisory 2020-1422-01 - This release of Red Hat build of Eclipse Vert.x 3.9.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Full Article
0 Latest Symantec CEO's 'Revolution' Could Axe 1,000 Jobs By packetstormsecurity.com Published On :: Thu, 24 Jan 2013 16:08:39 GMT Full Article headline virus symantec
0 Symantec Sink Holes 500,000 Zombie Machines By packetstormsecurity.com Published On :: Tue, 01 Oct 2013 15:00:30 GMT Full Article headline malware cybercrime botnet fraud symantec
0 Malware Boom Forces Security Vendors To Roll Out Upgrades Every 40 Minutes By packetstormsecurity.com Published On :: Tue, 08 Apr 2014 15:31:05 GMT Full Article headline malware virus cybercrime fraud symantec
0 Google Takes Symantec To The Woodshed For Mis-Issuing 30,000 HTTPS Certs By packetstormsecurity.com Published On :: Fri, 24 Mar 2017 14:43:45 GMT Full Article headline privacy flaw google symantec cryptography
0 23,000 HTTPS Certs Will Be Axed In Next 24 Hours Amid Bitter Turf War By packetstormsecurity.com Published On :: Thu, 01 Mar 2018 01:02:09 GMT Full Article headline privacy symantec cryptography
0 Over 25,000 Linksys Routers Are Leaking Sensitive Data By packetstormsecurity.com Published On :: Tue, 14 May 2019 13:51:12 GMT Full Article headline hacker privacy data loss flaw cisco
0 Over 20k Linksys Routers Leak Every Device Ever Connected By packetstormsecurity.com Published On :: Mon, 20 May 2019 14:43:25 GMT Full Article headline privacy data loss flaw cisco
0 HC10 HC.Server Service 10.14 Remote Invalid Pointer Write By packetstormsecurity.com Published On :: Mon, 17 Jun 2019 17:03:28 GMT The HC.Server service in Hosting Controller HC10 10.14 allows an Invalid Pointer Write DoS if attackers can reach the service on port 8794. In addition this can potentially be leveraged for post exploit persistence with SYSTEM privileges, if physical access or malware is involved. If a physical attacker or malware can set its own program for the service failure recovery options, it can be used to maintain persistence. Afterwards, it can be triggered by sending a malicious request to DoS the service, which in turn can start the attackers recovery program. The attackers program can then try restarting the affected service to try an stay unnoticed by calling "sc start HCServerService". Services failure flag recovery options for "enabling actions for stops or errors" and can be set in the services "Recovery" properties tab or on the command line. Authentication is not required to reach the vulnerable service, this was tested successfully on Windows 7/10. Full Article
0 Apple Security Advisory 2019-7-23-1 By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 18:22:22 GMT Apple Security Advisory 2019-7-23-1 - iCloud for Windows 7.13 is now available and addresses code execution and cross site scripting vulnerabilities. Full Article
0 Microsoft Windows 7 Build 7601 (x86) Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 26 Jul 2019 03:22:22 GMT Microsoft Windows 7 Build 7601 (x86) local privilege escalation exploit. Full Article
0 Apple Security Advisory 2019-10-07-4 By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 20:44:48 GMT Apple Security Advisory 2019-10-07-4 - iCloud for Windows 7.14 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities. Full Article
0 Red Hat Security Advisory 2019-1790-01 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:10:26 GMT Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
0 Red Hat Security Advisory 2019-1942-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:17:37 GMT Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
0 Red Hat Security Advisory 2019-2097-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:11:21 GMT Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability. Full Article
0 Red Hat Security Advisory 2019-2400-01 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:08:30 GMT Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
0 Webmin 1.920 password_change.cgi Backdoor By packetstormsecurity.com Published On :: Fri, 23 Aug 2019 20:09:56 GMT This Metasploit module exploits a backdoor in Webmin versions 1.890 through 1.920. Only the SourceForge downloads were backdoored, but they are listed as official downloads on the project's site. Unknown attacker(s) inserted Perl qx statements into the build server's source code on two separate occasions: once in April 2018, introducing the backdoor in the 1.890 release, and in July 2018, reintroducing the backdoor in releases 1.900 through 1.920. Only version 1.890 is exploitable in the default install. Later affected versions require the expired password changing feature to be enabled. Full Article
0 Gentoo Linux Security Advisory 201909-01 By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 22:21:33 GMT Gentoo Linux Security Advisory 201909-1 - Multiple vulnerabilities have been found in Perl, the worst of which could result in the arbitrary execution of code. Versions less than 5.28.2 are affected. Full Article
0 Red Hat Security Advisory 2020-1616-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:22:15 GMT Red Hat Security Advisory 2020-1616-01 - Irssi is a modular IRC client with Perl scripting. Issues addressed include a use-after-free vulnerability. Full Article
0 School ERP System 1.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:16:46 GMT School ERP System version 1.0 suffers from a cross site request forgery vulnerability. Full Article
0 Online Job Portal 1.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:43:41 GMT Online Job Portal version 1.0 suffers from a cross site request forgery vulnerability. Full Article
0 Ice HRM 26.2.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Sun, 16 Feb 2020 20:22:22 GMT Ice HRM version 26.2.0 suffers from a cross site request forgery vulnerability. Full Article
0 CandidATS 2.1.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:24:01 GMT CandidATS version 2.1.0 suffers from a cross site request forgery vulnerability. Full Article
0 Business Live Chat Software 1.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Wed, 26 Feb 2020 17:02:22 GMT Business Live Chat Software version 1.0 suffers from a cross site request forgery vulnerability. Full Article
0 Enhanced Multimedia Router 3.0.4.27 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:50:22 GMT Enhanced Multimedia Router version 3.0.4.27 suffers from a cross site request forgery vulnerability. Full Article
0 Exagate Sysguard 6001 Cross Site Request Forgery By packetstormsecurity.com Published On :: Fri, 20 Mar 2020 14:45:22 GMT Exagate Sysguard 6001 suffers from a cross site request forgery vulnerability. Full Article
0 ECK Hotel 1.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Fri, 27 Mar 2020 13:11:49 GMT ECK Hotel version 1.0 suffers from a cross site request forgery vulnerability. Full Article
0 Red Hat Security Advisory 2020-1050-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:05:46 GMT Red Hat Security Advisory 2020-1050-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include a cross site request forgery vulnerability. Full Article
0 Apache OFBiz 17.12.03 Cross Site Request Forgery By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:44:30 GMT Apache OFBiz version 17.12.03 suffers from a cross site request forgery vulnerability. Full Article
0 Integria IMS 5.0.86 Arbitrary File Upload By packetstormsecurity.com Published On :: Fri, 16 Aug 2019 16:25:02 GMT Integria IMS version 5.0.86 suffers from an arbitrary file upload vulnerability that allows for remote command execution. Full Article
0 Linear eMerge E3 1.00-06 Arbitrary File Upload Remote Root Code Execution By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 17:10:03 GMT Linear eMerge E3 versions 1.00-06 and below arbitrary file upload remote root code execution exploit. Full Article
0 Optergy 2.3.0a Remote Root By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 18:44:20 GMT Optergy versions 2.3.0a and below authenticated file upload remote root code execution exploit. Full Article
0 Online Book Store 1.0 Arbitrary File Upload By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 02:22:22 GMT Online Book Store version 1.0 suffers from an arbitrary file upload vulnerability. Full Article
0 Joomla GMapFP 3.30 Arbitrary File Upload By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:12:53 GMT Joomla GMapFP component version 3.30 suffers from an arbitrary file upload vulnerability. Full Article
0 Air Sender 1.0.2 Arbitrary File Upload By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:38:54 GMT Air Sender version 1.0.2 for iOS suffers from an arbitrary file upload vulnerability. Full Article
0 Gigamon GigaVUE 5.5.01.11 Directory Traversal / File Upload By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:53:01 GMT Gigamon GigaVUE version 5.5.01.11 suffers from directory traversal and file upload with command execution vulnerabilities. Gigamon has chosen to sunset this product and not offer a patch. Full Article
0 Online Clothing Store 1.0 Arbitrary File Upload By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:26:30 GMT Online Clothing Store version 1.0 suffers from an arbitrary file upload vulnerability. Full Article
0 RBS Pulls Samsung Galaxy S10 App Over Security Flaw By packetstormsecurity.com Published On :: Thu, 24 Oct 2019 18:49:18 GMT Full Article headline bank phone fraud flaw samsung
0 Kaspersky Identifies APT Mentioned In 2017 Shadow Brokers Leak By packetstormsecurity.com Published On :: Tue, 05 Nov 2019 15:11:59 GMT Full Article headline hacker government malware usa russia cyberwar nsa