it Cisco Zero-Day Exploited In The Wild To Crash And Reload Devices By packetstormsecurity.com Published On :: Thu, 01 Nov 2018 14:06:26 GMT Full Article headline hacker denial of service flaw cisco
it Cisco Re-Issues Patch For High Severity WebEx Flaw By packetstormsecurity.com Published On :: Wed, 28 Nov 2018 01:01:13 GMT Full Article headline flaw patch cisco
it UK Whitehats Blacklisted By Cisco Talos By packetstormsecurity.com Published On :: Thu, 13 Dec 2018 17:18:54 GMT Full Article headline malware flaw cisco
it Cisco Fixes Critical Flaw In Wireless VPN, Firewall Routers By packetstormsecurity.com Published On :: Thu, 28 Feb 2019 15:35:39 GMT Full Article headline flaw patch cisco
it Nexus Switch Owners Told To Disable POAP Feature By packetstormsecurity.com Published On :: Thu, 07 Mar 2019 02:17:00 GMT Full Article headline flaw cisco
it Cisco Patches High Severity Flaws In IP Phones By packetstormsecurity.com Published On :: Thu, 21 Mar 2019 13:05:46 GMT Full Article headline flaw patch cisco
it Over 25,000 Linksys Routers Are Leaking Sensitive Data By packetstormsecurity.com Published On :: Tue, 14 May 2019 13:51:12 GMT Full Article headline hacker privacy data loss flaw cisco
it High Severity Cisco Flaw In IOS XE Enables Device Takeover By packetstormsecurity.com Published On :: Thu, 13 Jun 2019 16:06:55 GMT Full Article headline flaw cisco
it Cisco Warns Of Critical Flaws In Data Center Network Manager By packetstormsecurity.com Published On :: Thu, 27 Jun 2019 14:09:21 GMT Full Article headline flaw cisco
it New Year, New Critical Cisco Patches To Install By packetstormsecurity.com Published On :: Sat, 04 Jan 2020 16:06:28 GMT Full Article headline flaw patch cisco
it Cisco Tackles SD-WAN Root Privilege Vulnerability By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:12:51 GMT Full Article headline flaw patch cisco
it Symantec Endpoint Protection Race Condition By packetstormsecurity.com Published On :: Tue, 05 May 2020 20:55:07 GMT Symantec Endpoint Protection versions 14.2.5323.2000, 14.2.5569.2100, and 14.2.5587.2100 suffer from a race condition vulnerability. Full Article
it HC10 HC.Server Service 10.14 Remote Invalid Pointer Write By packetstormsecurity.com Published On :: Mon, 17 Jun 2019 17:03:28 GMT The HC.Server service in Hosting Controller HC10 10.14 allows an Invalid Pointer Write DoS if attackers can reach the service on port 8794. In addition this can potentially be leveraged for post exploit persistence with SYSTEM privileges, if physical access or malware is involved. If a physical attacker or malware can set its own program for the service failure recovery options, it can be used to maintain persistence. Afterwards, it can be triggered by sending a malicious request to DoS the service, which in turn can start the attackers recovery program. The attackers program can then try restarting the affected service to try an stay unnoticed by calling "sc start HCServerService". Services failure flag recovery options for "enabling actions for stops or errors" and can be set in the services "Recovery" properties tab or on the command line. Authentication is not required to reach the vulnerable service, this was tested successfully on Windows 7/10. Full Article
it Apple Security Advisory 2019-7-23-1 By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 18:22:22 GMT Apple Security Advisory 2019-7-23-1 - iCloud for Windows 7.13 is now available and addresses code execution and cross site scripting vulnerabilities. Full Article
it Microsoft Windows Internet Settings Security Feature Bypass By packetstormsecurity.com Published On :: Tue, 17 Sep 2019 16:50:38 GMT Microsoft Windows suffers from an Internet Settings misconfiguration security feature bypass vulnerability. Versions affected include Windows 7 SP1, 8.0, 8.1 x86 and x64 with full patches up to July 2019. Full Article
it Apple Security Advisory 2019-10-07-4 By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 20:44:48 GMT Apple Security Advisory 2019-10-07-4 - iCloud for Windows 7.14 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities. Full Article
it Red Hat Security Advisory 2019-1790-01 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:10:26 GMT Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
it Red Hat Security Advisory 2019-1942-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:17:37 GMT Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
it Red Hat Security Advisory 2019-2097-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:11:21 GMT Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability. Full Article
it Red Hat Security Advisory 2019-2400-01 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:08:30 GMT Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
it Gentoo Linux Security Advisory 201909-01 By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 22:21:33 GMT Gentoo Linux Security Advisory 201909-1 - Multiple vulnerabilities have been found in Perl, the worst of which could result in the arbitrary execution of code. Versions less than 5.28.2 are affected. Full Article
it Debian Security Advisory 4584-1 By packetstormsecurity.com Published On :: Mon, 16 Dec 2019 15:59:48 GMT Debian Linux Security Advisory 4584-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. Full Article
it Red Hat Security Advisory 2020-1616-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:22:15 GMT Red Hat Security Advisory 2020-1616-01 - Irssi is a modular IRC client with Perl scripting. Issues addressed include a use-after-free vulnerability. Full Article
it JetBlue Bomb Scare Set Off With Apple AirDrop By packetstormsecurity.com Published On :: Wed, 17 Jul 2019 13:08:16 GMT Full Article headline apple terror
it It's Hacker Summer Camp This Week - Expect Searches For Guns In Your Hotel Room By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 14:42:12 GMT Full Article headline hacker government usa terror conference
it Boeing Code Leak Exposes Security Flaws Deep In 787s By packetstormsecurity.com Published On :: Fri, 09 Aug 2019 16:04:18 GMT Full Article headline flaw terror
it US Hospitals Turn Away Patients As Ransomware Strikes By packetstormsecurity.com Published On :: Wed, 02 Oct 2019 14:54:59 GMT Full Article headline hacker malware cybercrime fraud terror
it Pensacola Hit With Cyber Attack Hours After Shooting At Naval Base By packetstormsecurity.com Published On :: Tue, 10 Dec 2019 14:57:35 GMT Full Article headline government usa terror
it N.J. Hospital System Pays Up In Ransomware Attack By packetstormsecurity.com Published On :: Tue, 17 Dec 2019 15:37:08 GMT Full Article headline hacker malware cybercrime fraud terror cryptography
it Hackers Steal Data For 15 Million Patients And Then Sell It Back By packetstormsecurity.com Published On :: Wed, 18 Dec 2019 13:57:18 GMT Full Article headline hacker cybercrime data loss fraud terror cryptography
it Fake SWAT Calls Hit Tech Execs By packetstormsecurity.com Published On :: Fri, 24 Jan 2020 16:52:11 GMT Full Article headline government facebook terror
it Cybersecurity Lacking At Most Of The World's Major Airports By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:28:20 GMT Full Article headline hacker privacy data loss flaw terror
it School ERP System 1.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:16:46 GMT School ERP System version 1.0 suffers from a cross site request forgery vulnerability. Full Article
it AVideo Platform 8.1 Cross Site Request Forgery By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:33:56 GMT AVideo Platform version 8.1 suffers from a cross site request forgery vulnerability. Full Article
it Online Job Portal 1.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:43:41 GMT Online Job Portal version 1.0 suffers from a cross site request forgery vulnerability. Full Article
it SOPlanning 1.45 Cross Site Request Forgery By packetstormsecurity.com Published On :: Sat, 15 Feb 2020 19:59:22 GMT SOPlanning version 1.45 suffers from a cross site request forgery vulnerability. Full Article
it Ice HRM 26.2.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Sun, 16 Feb 2020 20:22:22 GMT Ice HRM version 26.2.0 suffers from a cross site request forgery vulnerability. Full Article
it Easy2Pilot 7 Cross Site Request Forgery By packetstormsecurity.com Published On :: Thu, 20 Feb 2020 17:41:12 GMT Easy2Pilot version 7 suffers from a cross site request forgery vulnerability. Full Article
it CandidATS 2.1.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:24:01 GMT CandidATS version 2.1.0 suffers from a cross site request forgery vulnerability. Full Article
it Easy2Pilot 8 SQL Injection / Cross Site Request Forgery By packetstormsecurity.com Published On :: Wed, 26 Feb 2020 04:44:44 GMT Easy2Pilot version 8 suffers from remote SQL injection, backdoor account, and cross site request forgery vulnerabilities. Full Article
it Business Live Chat Software 1.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Wed, 26 Feb 2020 17:02:22 GMT Business Live Chat Software version 1.0 suffers from a cross site request forgery vulnerability. Full Article
it WordPress Tutor LMS 1.5.3 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:26:06 GMT WordPress Tutor LMS plugin version 1.5.3 suffers from a cross site request forgery vulnerability. Full Article
it Wing FTP Server 6.2.3 Cross Site Request Forgery By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 12:02:22 GMT Wing FTP Server version 2.3 suffers from a cross site request forgery vulnerability. Full Article
it HRSALE 1.1.8 Cross Site Request Forgery By packetstormsecurity.com Published On :: Thu, 12 Mar 2020 19:47:06 GMT HRSALE version 1.1.8 suffers from a cross site request forgery vulnerability. Full Article
it Enhanced Multimedia Router 3.0.4.27 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:50:22 GMT Enhanced Multimedia Router version 3.0.4.27 suffers from a cross site request forgery vulnerability. Full Article
it Exagate Sysguard 6001 Cross Site Request Forgery By packetstormsecurity.com Published On :: Fri, 20 Mar 2020 14:45:22 GMT Exagate Sysguard 6001 suffers from a cross site request forgery vulnerability. Full Article
it ECK Hotel 1.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Fri, 27 Mar 2020 13:11:49 GMT ECK Hotel version 1.0 suffers from a cross site request forgery vulnerability. Full Article
it Red Hat Security Advisory 2020-1050-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:05:46 GMT Red Hat Security Advisory 2020-1050-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include a cross site request forgery vulnerability. Full Article
it P5 FNIP-8x16A/FNIP-4xSH CSRF / Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:15:30 GMT P5 FNIP-8x16A / FNIP-4xSH versions 1.0.20 and 1.0.11 suffer from cross site request forgery and cross site scripting vulnerabilities. Full Article
it QRadar Community Edition 7.3.1.6 CSRF / Weak Access Control By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 19:57:06 GMT QRadar Community Edition version 7.3.1.6 suffers from cross site request forgery and weak access control vulnerabilities. Full Article