or

Cisco Warns Of Critical Flaws In Data Center Network Manager






or

Apple Security Advisory 2019-7-23-1

Apple Security Advisory 2019-7-23-1 - iCloud for Windows 7.13 is now available and addresses code execution and cross site scripting vulnerabilities.




or

Apple Security Advisory 2019-10-07-4

Apple Security Advisory 2019-10-07-4 - iCloud for Windows 7.14 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities.




or

Red Hat Security Advisory 2019-1790-01

Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.




or

Red Hat Security Advisory 2019-1942-01

Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.




or

Red Hat Security Advisory 2019-2097-01

Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability.




or

Red Hat Security Advisory 2019-2400-01

Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.




or

Webmin 1.920 password_change.cgi Backdoor

This Metasploit module exploits a backdoor in Webmin versions 1.890 through 1.920. Only the SourceForge downloads were backdoored, but they are listed as official downloads on the project's site. Unknown attacker(s) inserted Perl qx statements into the build server's source code on two separate occasions: once in April 2018, introducing the backdoor in the 1.890 release, and in July 2018, reintroducing the backdoor in releases 1.900 through 1.920. Only version 1.890 is exploitable in the default install. Later affected versions require the expired password changing feature to be enabled.




or

Gentoo Linux Security Advisory 201909-01

Gentoo Linux Security Advisory 201909-1 - Multiple vulnerabilities have been found in Perl, the worst of which could result in the arbitrary execution of code. Versions less than 5.28.2 are affected.




or

Debian Security Advisory 4584-1

Debian Linux Security Advisory 4584-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis.




or

Red Hat Security Advisory 2020-1616-01

Red Hat Security Advisory 2020-1616-01 - Irssi is a modular IRC client with Perl scripting. Issues addressed include a use-after-free vulnerability.






or

Planes, Gate, And Bags: How Hackers Can Hijack Your Local Airport







or

School ERP System 1.0 Cross Site Request Forgery

School ERP System version 1.0 suffers from a cross site request forgery vulnerability.




or

AVideo Platform 8.1 Cross Site Request Forgery

AVideo Platform version 8.1 suffers from a cross site request forgery vulnerability.




or

Online Job Portal 1.0 Cross Site Request Forgery

Online Job Portal version 1.0 suffers from a cross site request forgery vulnerability.




or

SOPlanning 1.45 Cross Site Request Forgery

SOPlanning version 1.45 suffers from a cross site request forgery vulnerability.




or

Ice HRM 26.2.0 Cross Site Request Forgery

Ice HRM version 26.2.0 suffers from a cross site request forgery vulnerability.




or

Easy2Pilot 7 Cross Site Request Forgery

Easy2Pilot version 7 suffers from a cross site request forgery vulnerability.




or

CandidATS 2.1.0 Cross Site Request Forgery

CandidATS version 2.1.0 suffers from a cross site request forgery vulnerability.




or

Easy2Pilot 8 SQL Injection / Cross Site Request Forgery

Easy2Pilot version 8 suffers from remote SQL injection, backdoor account, and cross site request forgery vulnerabilities.




or

Business Live Chat Software 1.0 Cross Site Request Forgery

Business Live Chat Software version 1.0 suffers from a cross site request forgery vulnerability.




or

WordPress Tutor LMS 1.5.3 Cross Site Request Forgery

WordPress Tutor LMS plugin version 1.5.3 suffers from a cross site request forgery vulnerability.




or

Wing FTP Server 6.2.3 Cross Site Request Forgery

Wing FTP Server version 2.3 suffers from a cross site request forgery vulnerability.




or

HRSALE 1.1.8 Cross Site Request Forgery

HRSALE version 1.1.8 suffers from a cross site request forgery vulnerability.




or

Enhanced Multimedia Router 3.0.4.27 Cross Site Request Forgery

Enhanced Multimedia Router version 3.0.4.27 suffers from a cross site request forgery vulnerability.




or

Exagate Sysguard 6001 Cross Site Request Forgery

Exagate Sysguard 6001 suffers from a cross site request forgery vulnerability.




or

ECK Hotel 1.0 Cross Site Request Forgery

ECK Hotel version 1.0 suffers from a cross site request forgery vulnerability.




or

Red Hat Security Advisory 2020-1050-01

Red Hat Security Advisory 2020-1050-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include a cross site request forgery vulnerability.




or

Edimax EW-7438RPn Cross Site Request Forgery

Edimax EW-7438RPn suffers from a cross site request forgery vulnerability.




or

Complaint Management System 4.2 Cross Site Request Forgery

Complaint Management System version 4.2 suffers from a cross site request forgery vulnerability.




or

Maian Support Helpdesk 4.3 Cross Site Request Forgery

Maian Support Helpdesk version 4.3 suffers from a cross site request forgery vulnerability.




or

Apache OFBiz 17.12.03 Cross Site Request Forgery

Apache OFBiz version 17.12.03 suffers from a cross site request forgery vulnerability.





or

Hospitals Must Secure Vital Backend Networks Before It's Too Late




or

ATutor 2.2.4 Arbitrary File Upload / Command Execution

ATutor version 2.2.4 suffers from a language_import arbitrary file upload that allows for command execution.




or

Cisco Data Center Network Manager Unauthenticated Remote Code Execution

DCNM exposes a file upload servlet (FileUploadServlet) at /fm/fileUpload. An authenticated user can abuse this servlet to upload a WAR to the Apache Tomcat webapps directory and achieve remote code execution as root. This module exploits two other vulnerabilities, CVE-2019-1619 for authentication bypass on versions 10.4(2) and below, and CVE-2019-1622 (information disclosure) to obtain the correct directory for the WAR file upload. This module was tested on the DCNM Linux virtual appliance 10.4(2), 11.0(1) and 11.1(1), and should work on a few versions below 10.4(2). Only version 11.0(1) requires authentication to exploit (see References to understand why).




or

IBM Bigfix Platform 9.5.9.62 Arbitary File Upload / Code Execution

IBM Bigfix Platform version 9.5.9.62 suffers from an arbitrary file upload vulnerability as root that can achieve remote code execution.




or

Online Book Store 1.0 Arbitrary File Upload

Online Book Store version 1.0 suffers from an arbitrary file upload vulnerability.




or

WordPress Event-Registration 5.43 Arbitrary File Upload

WordPress Event-Registration plugin version 5.43 suffers from an arbitrary file upload vulnerability.




or

Gigamon GigaVUE 5.5.01.11 Directory Traversal / File Upload

Gigamon GigaVUE version 5.5.01.11 suffers from directory traversal and file upload with command execution vulnerabilities. Gigamon has chosen to sunset this product and not offer a patch.




or

Online Clothing Store 1.0 Arbitrary File Upload

Online Clothing Store version 1.0 suffers from an arbitrary file upload vulnerability.