1 Pachev FTP Server 1.0 Path Traversal By packetstormsecurity.com Published On :: Thu, 23 Jan 2020 14:44:44 GMT Pachev FTP Server version 1.0 suffers from a path traversal vulnerability. Full Article
1 Lotus Core CMS 1.0.1 Local File Inclusion By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:29:56 GMT Lotus Core CMS version 1.0.1 suffers from a local file inclusion vulnerability. Full Article
1 SuiteCRM 7.11.11 Broken Access Control / Local File Inclusion By packetstormsecurity.com Published On :: Thu, 13 Feb 2020 15:49:06 GMT SuiteCRM versions 7.11.11 and below suffer from an add_to_prospect_list broken access control that allows for local file inclusion attacks. Full Article
1 FIBARO System Home Center 5.021 Remote File Inclusion / XSS By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:12:32 GMT FIBARO System Home Center version 5.021 suffers from cross site scripting and remote file inclusion vulnerabilities. Full Article
1 Jinfornet Jreport 15.6 Directory Traversal By packetstormsecurity.com Published On :: Fri, 27 Mar 2020 12:55:54 GMT Jinfornet Jreport version 15.6 suffers from an unauthenticated directory traversal vulnerability. Full Article
1 Joomla Fabrik 3.9.11 Directory Traversal By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:44:08 GMT Joomla Fabrik component version 3.9.11 suffers from a directory traversal vulnerability. Full Article
1 LimeSurvey 4.1.11 Path Traversal By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 19:22:22 GMT LimeSurvey version 4.1.11 suffers from a File Manager path traversal vulnerability. Full Article
1 Zen Load Balancer 3.10.1 Directory Traversal By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 21:34:01 GMT Zen Load Balancer version 3.10.1 suffers from a directory traversal vulnerability. This finding was originally discovered by Cody Sixteen. Full Article
1 TVT NVMS 1000 Directory Traversal By packetstormsecurity.com Published On :: Mon, 13 Apr 2020 14:44:44 GMT TVT NVMS 1000 suffers from a directory traversal vulnerability. Full Article
1 QRadar Community Edition 7.3.1.6 Arbitrary Object Instantiation By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:15:08 GMT QRadar Community Edition version 7.3.1.6 is vulnerable to instantiation of arbitrary objects based on user-supplied input. An authenticated attacker can abuse this to perform various types of attacks including server-side request forgery and (potentially) arbitrary execution of code. Full Article
1 Over 100 Fraudsters Arrested By US And Romanian Police By packetstormsecurity.com Published On :: Sat, 16 Jul 2011 16:14:14 GMT Full Article headline usa fraud romania
1 Romanian Gets 21-Months For Subway POS Hack By packetstormsecurity.com Published On :: Wed, 09 Jan 2013 06:40:46 GMT Full Article headline hacker usa fraud flaw romania
1 International Raids Arrest 110 Players In Investment Fraud Schemes By packetstormsecurity.com Published On :: Fri, 28 Feb 2014 21:38:14 GMT Full Article headline hacker usa britain cybercrime fraud scam spain romania
1 Kentico CMS 12.0.14 Remote Command Execution By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:59:11 GMT This Metasploit module exploits a vulnerability in the Kentico CMS platform versions 12.0.14 and earlier. Remote command execution is possible via unauthenticated XML requests to the Staging Service SyncServer.asmx interface ProcessSynchronizationTaskData method stagingTaskData parameter. XML input is passed to an insecure .NET deserialize call which allows for remote command execution. Full Article
1 Ac4p.com Gallery 1.0 Cross Site Scripting / Shell Upload / Bypass / Disclosure By packetstormsecurity.com Published On :: Tue, 23 Feb 2010 07:00:24 GMT Ac4p.com Gallery version 1.0 suffers from cross site scripting, phpinfo disclosure, shell upload, and insecure cookie handling vulnerabilities. Full Article
1 CuteNews 1.4.6 Insecure Cookie Handling By packetstormsecurity.com Published On :: Tue, 16 Mar 2010 23:26:53 GMT CuteNews version 1.4.6 suffers from an insecure cookie handling vulnerability. Full Article
1 velBox 1.2 Insecure Cookie Handling By packetstormsecurity.com Published On :: Thu, 01 Apr 2010 23:22:33 GMT velBox version 1.2 suffers from an insecure cookie handling vulnerability. Full Article
1 Tornado 1.0 Insecure Cookie By packetstormsecurity.com Published On :: Tue, 17 Aug 2010 01:14:15 GMT Tornado version 1.0 suffers from an insecure cookie vulnerability. Full Article
1 Aleza Portal 1.6 Insecure Cookie By packetstormsecurity.com Published On :: Wed, 29 Sep 2010 00:32:20 GMT Aleza Portal version 1.6 suffers from an insecure cookie handling vulnerability that allows for SQL injection. Full Article
1 Totaljs CMS 12.0 Insecure Admin Session Cookie By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 23:20:22 GMT Totaljs CMS version 12.0 mints an insecure cookie that can be used to crack the administrator password. Full Article
1 Red Hat Security Advisory 2020-1975-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:37 GMT Red Hat Security Advisory 2020-1975-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
1 Red Hat Security Advisory 2020-1979-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:52 GMT Red Hat Security Advisory 2020-1979-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
1 Red Hat Security Advisory 2020-1978-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:05 GMT Red Hat Security Advisory 2020-1978-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
1 Red Hat Security Advisory 2020-1980-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:13 GMT Red Hat Security Advisory 2020-1980-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
1 Red Hat Security Advisory 2020-1422-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:30 GMT Red Hat Security Advisory 2020-1422-01 - This release of Red Hat build of Eclipse Vert.x 3.9.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Full Article
1 Latest Symantec CEO's 'Revolution' Could Axe 1,000 Jobs By packetstormsecurity.com Published On :: Thu, 24 Jan 2013 16:08:39 GMT Full Article headline virus symantec
1 Google Will Remove Trust Of Symantec's PCA3-G1 Certificate By packetstormsecurity.com Published On :: Tue, 15 Dec 2015 01:05:58 GMT Full Article headline privacy google symantec cryptography
1 HC10 HC.Server Service 10.14 Remote Invalid Pointer Write By packetstormsecurity.com Published On :: Mon, 17 Jun 2019 17:03:28 GMT The HC.Server service in Hosting Controller HC10 10.14 allows an Invalid Pointer Write DoS if attackers can reach the service on port 8794. In addition this can potentially be leveraged for post exploit persistence with SYSTEM privileges, if physical access or malware is involved. If a physical attacker or malware can set its own program for the service failure recovery options, it can be used to maintain persistence. Afterwards, it can be triggered by sending a malicious request to DoS the service, which in turn can start the attackers recovery program. The attackers program can then try restarting the affected service to try an stay unnoticed by calling "sc start HCServerService". Services failure flag recovery options for "enabling actions for stops or errors" and can be set in the services "Recovery" properties tab or on the command line. Authentication is not required to reach the vulnerable service, this was tested successfully on Windows 7/10. Full Article
1 Apple Security Advisory 2019-7-23-1 By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 18:22:22 GMT Apple Security Advisory 2019-7-23-1 - iCloud for Windows 7.13 is now available and addresses code execution and cross site scripting vulnerabilities. Full Article
1 Microsoft Windows 7 Build 7601 (x86) Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 26 Jul 2019 03:22:22 GMT Microsoft Windows 7 Build 7601 (x86) local privilege escalation exploit. Full Article
1 Apple Security Advisory 2019-10-07-4 By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 20:44:48 GMT Apple Security Advisory 2019-10-07-4 - iCloud for Windows 7.14 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities. Full Article
1 ASX To MP3 Converter 3.1.3.7 Stack Overflow By packetstormsecurity.com Published On :: Thu, 10 Oct 2019 14:39:24 GMT This Metasploit module exploits a stack buffer overflow in ASX to MP3 converter 3.1.3.7. By constructing a specially crafted ASX file and attempting to convert it to an MP3 file in the application, a buffer is overwritten, which allows for running shellcode. Tested on: Microsoft Windows 7 Enterprise, 6.1.7601 Service Pack 1 Build 7601, x64-based PC Microsoft Windows 10 Pro, 10.0.18362 N/A Build 18362, x64-based PC. Full Article
1 Red Hat Security Advisory 2019-1790-01 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:10:26 GMT Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
1 Red Hat Security Advisory 2019-1942-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:17:37 GMT Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
1 Red Hat Security Advisory 2019-2097-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:11:21 GMT Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability. Full Article
1 Red Hat Security Advisory 2019-2400-01 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:08:30 GMT Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
1 Webmin 1.920 password_change.cgi Backdoor By packetstormsecurity.com Published On :: Fri, 23 Aug 2019 20:09:56 GMT This Metasploit module exploits a backdoor in Webmin versions 1.890 through 1.920. Only the SourceForge downloads were backdoored, but they are listed as official downloads on the project's site. Unknown attacker(s) inserted Perl qx statements into the build server's source code on two separate occasions: once in April 2018, introducing the backdoor in the 1.890 release, and in July 2018, reintroducing the backdoor in releases 1.900 through 1.920. Only version 1.890 is exploitable in the default install. Later affected versions require the expired password changing feature to be enabled. Full Article
1 Gentoo Linux Security Advisory 201909-01 By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 22:21:33 GMT Gentoo Linux Security Advisory 201909-1 - Multiple vulnerabilities have been found in Perl, the worst of which could result in the arbitrary execution of code. Versions less than 5.28.2 are affected. Full Article
1 Debian Security Advisory 4584-1 By packetstormsecurity.com Published On :: Mon, 16 Dec 2019 15:59:48 GMT Debian Linux Security Advisory 4584-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. Full Article
1 Red Hat Security Advisory 2020-1616-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:22:15 GMT Red Hat Security Advisory 2020-1616-01 - Irssi is a modular IRC client with Perl scripting. Issues addressed include a use-after-free vulnerability. Full Article
1 Hackers Steal Data For 15 Million Patients And Then Sell It Back By packetstormsecurity.com Published On :: Wed, 18 Dec 2019 13:57:18 GMT Full Article headline hacker cybercrime data loss fraud terror cryptography
1 School ERP System 1.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:16:46 GMT School ERP System version 1.0 suffers from a cross site request forgery vulnerability. Full Article
1 AVideo Platform 8.1 Cross Site Request Forgery By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:33:56 GMT AVideo Platform version 8.1 suffers from a cross site request forgery vulnerability. Full Article
1 Online Job Portal 1.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:43:41 GMT Online Job Portal version 1.0 suffers from a cross site request forgery vulnerability. Full Article
1 SOPlanning 1.45 Cross Site Request Forgery By packetstormsecurity.com Published On :: Sat, 15 Feb 2020 19:59:22 GMT SOPlanning version 1.45 suffers from a cross site request forgery vulnerability. Full Article
1 CandidATS 2.1.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:24:01 GMT CandidATS version 2.1.0 suffers from a cross site request forgery vulnerability. Full Article
1 Business Live Chat Software 1.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Wed, 26 Feb 2020 17:02:22 GMT Business Live Chat Software version 1.0 suffers from a cross site request forgery vulnerability. Full Article
1 WordPress Tutor LMS 1.5.3 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:26:06 GMT WordPress Tutor LMS plugin version 1.5.3 suffers from a cross site request forgery vulnerability. Full Article
1 HRSALE 1.1.8 Cross Site Request Forgery By packetstormsecurity.com Published On :: Thu, 12 Mar 2020 19:47:06 GMT HRSALE version 1.1.8 suffers from a cross site request forgery vulnerability. Full Article
1 Exagate Sysguard 6001 Cross Site Request Forgery By packetstormsecurity.com Published On :: Fri, 20 Mar 2020 14:45:22 GMT Exagate Sysguard 6001 suffers from a cross site request forgery vulnerability. Full Article