is Virgin Media Learns About Poor Outsourcing Decisions By packetstormsecurity.com Published On :: Fri, 04 Mar 2016 16:02:25 GMT Full Article headline india flaw cryptography
is Hackers Steal $13.5 Million In Cosmos Bank Heist By packetstormsecurity.com Published On :: Mon, 27 Aug 2018 13:47:03 GMT Full Article headline hacker malware bank india cybercrime fraud
is $100k Paid Out For Google Cloud Shell Root Compromise By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:49:12 GMT Full Article headline hacker flaw google
is Alleged Romanian Phishers Finally Hauled Into US Courts By packetstormsecurity.com Published On :: Wed, 30 Sep 2009 17:28:45 GMT Full Article government usa phish romania
is Little Town in Romania Is Cybercrime Central By packetstormsecurity.com Published On :: Tue, 15 Feb 2011 15:30:24 GMT Full Article headline cybercrime romania
is U.S. Agent Lures Romanian Hackers In Subway Data Heist By packetstormsecurity.com Published On :: Fri, 18 Apr 2014 15:09:59 GMT Full Article headline hacker government bank usa romania
is Ac4p.com Gallery 1.0 Cross Site Scripting / Shell Upload / Bypass / Disclosure By packetstormsecurity.com Published On :: Tue, 23 Feb 2010 07:00:24 GMT Ac4p.com Gallery version 1.0 suffers from cross site scripting, phpinfo disclosure, shell upload, and insecure cookie handling vulnerabilities. Full Article
is Islamic Voice Insecure Cookie Handling By packetstormsecurity.com Published On :: Sat, 20 Mar 2010 02:20:37 GMT Islamic Voice suffers from an insecure cookie handling vulnerability. Full Article
is Red Hat Security Advisory 2020-1975-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:37 GMT Red Hat Security Advisory 2020-1975-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
is Red Hat Security Advisory 2020-1979-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:52 GMT Red Hat Security Advisory 2020-1979-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
is Red Hat Security Advisory 2020-1978-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:05 GMT Red Hat Security Advisory 2020-1978-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
is Red Hat Security Advisory 2020-1980-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:13 GMT Red Hat Security Advisory 2020-1980-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
is Red Hat Security Advisory 2020-1422-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:30 GMT Red Hat Security Advisory 2020-1422-01 - This release of Red Hat build of Eclipse Vert.x 3.9.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Full Article
is Latest Java Zero-Day Linked To Bit9 Compromise By packetstormsecurity.com Published On :: Sat, 02 Mar 2013 23:25:27 GMT Full Article headline hacker flaw symantec java
is Symantec Warns On Credit Card Security Phishing Scam By packetstormsecurity.com Published On :: Wed, 17 Apr 2013 14:55:05 GMT Full Article headline bank cybercrime scam symantec phish
is Symantec Fires Employees Over Issuing Rogue Google Security Certificates By packetstormsecurity.com Published On :: Mon, 21 Sep 2015 15:22:31 GMT Full Article headline cybercrime fraud google symantec cryptography
is Google Takes Symantec To The Woodshed For Mis-Issuing 30,000 HTTPS Certs By packetstormsecurity.com Published On :: Fri, 24 Mar 2017 14:43:45 GMT Full Article headline privacy flaw google symantec cryptography
is Cisco Patches Critical Vulnerabilities In Policy Suite By packetstormsecurity.com Published On :: Thu, 19 Jul 2018 14:27:38 GMT Full Article headline flaw patch cisco
is Cisco Patches Router OS Against New Crypto Attack By packetstormsecurity.com Published On :: Wed, 15 Aug 2018 03:44:19 GMT Full Article headline flaw patch cisco cryptography
is Cisco Warns Customers Of Critical Flaws, Including Struts By packetstormsecurity.com Published On :: Thu, 06 Sep 2018 13:13:53 GMT Full Article headline flaw patch cisco
is 88 Cisco Products Affected By FragmentSmack By packetstormsecurity.com Published On :: Wed, 26 Sep 2018 16:24:18 GMT Full Article headline linux denial of service flaw cisco
is Cisco Zero-Day Exploited In The Wild To Crash And Reload Devices By packetstormsecurity.com Published On :: Thu, 01 Nov 2018 14:06:26 GMT Full Article headline hacker denial of service flaw cisco
is Cisco Re-Issues Patch For High Severity WebEx Flaw By packetstormsecurity.com Published On :: Wed, 28 Nov 2018 01:01:13 GMT Full Article headline flaw patch cisco
is UK Whitehats Blacklisted By Cisco Talos By packetstormsecurity.com Published On :: Thu, 13 Dec 2018 17:18:54 GMT Full Article headline malware flaw cisco
is Cisco Fixes Critical Flaw In Wireless VPN, Firewall Routers By packetstormsecurity.com Published On :: Thu, 28 Feb 2019 15:35:39 GMT Full Article headline flaw patch cisco
is Nexus Switch Owners Told To Disable POAP Feature By packetstormsecurity.com Published On :: Thu, 07 Mar 2019 02:17:00 GMT Full Article headline flaw cisco
is Cisco Patches High Severity Flaws In IP Phones By packetstormsecurity.com Published On :: Thu, 21 Mar 2019 13:05:46 GMT Full Article headline flaw patch cisco
is Cisco Releases Flood Of Patches For IOS XE By packetstormsecurity.com Published On :: Thu, 28 Mar 2019 14:02:10 GMT Full Article headline flaw patch cisco
is Cisco Elastic Services Controller Allows Takeover By packetstormsecurity.com Published On :: Wed, 08 May 2019 13:07:21 GMT Full Article headline flaw patch cisco
is Cisco / WebEx Flaws Offer Up Remote Code Execution By packetstormsecurity.com Published On :: Thu, 16 May 2019 22:53:07 GMT Full Article headline hacker flaw cisco
is High Severity Cisco Flaw In IOS XE Enables Device Takeover By packetstormsecurity.com Published On :: Thu, 13 Jun 2019 16:06:55 GMT Full Article headline flaw cisco
is Cisco Warns Of Critical Flaws In Data Center Network Manager By packetstormsecurity.com Published On :: Thu, 27 Jun 2019 14:09:21 GMT Full Article headline flaw cisco
is Cisco To Pay $8.6 Million To Settle Whistle Blower Case By packetstormsecurity.com Published On :: Thu, 01 Aug 2019 16:48:15 GMT Full Article headline government usa flaw cisco
is Cisco Webex, Zoom Meetings Are Open To Snoopers, So Use Passwords By packetstormsecurity.com Published On :: Wed, 02 Oct 2019 14:55:12 GMT Full Article headline privacy data loss flaw password cisco spyware
is New Year, New Critical Cisco Patches To Install By packetstormsecurity.com Published On :: Sat, 04 Jan 2020 16:06:28 GMT Full Article headline flaw patch cisco
is Cisco Tackles SD-WAN Root Privilege Vulnerability By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:12:51 GMT Full Article headline flaw patch cisco
is Apple Security Advisory 2019-7-23-1 By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 18:22:22 GMT Apple Security Advisory 2019-7-23-1 - iCloud for Windows 7.13 is now available and addresses code execution and cross site scripting vulnerabilities. Full Article
is Apple Security Advisory 2019-10-07-4 By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 20:44:48 GMT Apple Security Advisory 2019-10-07-4 - iCloud for Windows 7.14 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities. Full Article
is Red Hat Security Advisory 2019-1790-01 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:10:26 GMT Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
is Red Hat Security Advisory 2019-1942-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:17:37 GMT Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
is Red Hat Security Advisory 2019-2097-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:11:21 GMT Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability. Full Article
is Red Hat Security Advisory 2019-2400-01 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:08:30 GMT Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
is Gentoo Linux Security Advisory 201909-01 By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 22:21:33 GMT Gentoo Linux Security Advisory 201909-1 - Multiple vulnerabilities have been found in Perl, the worst of which could result in the arbitrary execution of code. Versions less than 5.28.2 are affected. Full Article
is Debian Security Advisory 4584-1 By packetstormsecurity.com Published On :: Mon, 16 Dec 2019 15:59:48 GMT Debian Linux Security Advisory 4584-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. Full Article
is Red Hat Security Advisory 2020-1616-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:22:15 GMT Red Hat Security Advisory 2020-1616-01 - Irssi is a modular IRC client with Perl scripting. Issues addressed include a use-after-free vulnerability. Full Article
is It's Hacker Summer Camp This Week - Expect Searches For Guns In Your Hotel Room By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 14:42:12 GMT Full Article headline hacker government usa terror conference
is Red Hat Security Advisory 2020-1050-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:05:46 GMT Red Hat Security Advisory 2020-1050-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include a cross site request forgery vulnerability. Full Article
is Cisco Data Center Network Manager Unauthenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 02 Sep 2019 18:04:06 GMT DCNM exposes a file upload servlet (FileUploadServlet) at /fm/fileUpload. An authenticated user can abuse this servlet to upload a WAR to the Apache Tomcat webapps directory and achieve remote code execution as root. This module exploits two other vulnerabilities, CVE-2019-1619 for authentication bypass on versions 10.4(2) and below, and CVE-2019-1622 (information disclosure) to obtain the correct directory for the WAR file upload. This module was tested on the DCNM Linux virtual appliance 10.4(2), 11.0(1) and 11.1(1), and should work on a few versions below 10.4(2). Only version 11.0(1) requires authentication to exploit (see References to understand why). Full Article
is WordPress Event-Registration 5.43 Arbitrary File Upload By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 11:11:11 GMT WordPress Event-Registration plugin version 5.43 suffers from an arbitrary file upload vulnerability. Full Article
is Knox Vuln Is Android Not Us, Says Samsung By packetstormsecurity.com Published On :: Mon, 13 Jan 2014 15:33:09 GMT Full Article headline phone data loss flaw google cryptography samsung