9 DotNetNuke CMS 9.4.4 Zip Directory Traversal By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:21:21 GMT DotNetNuke CMS version 9.4.4 suffers from zip split issue where a directory traversal attack can be performed to overwrite files or execute malicious code. Full Article
9 PHPKB Multi-Language 9 Authenticated Directory Traversal By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:56:01 GMT PHPKB Multi-Language 9 suffers from an authenticated directory traversal vulnerability. Full Article
9 Joomla Fabrik 3.9.11 Directory Traversal By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:44:08 GMT Joomla Fabrik component version 3.9.11 suffers from a directory traversal vulnerability. Full Article
9 Penitent Romanian Hacker Aims To Protect World's ATMs By packetstormsecurity.com Published On :: Sun, 19 May 2013 05:46:28 GMT Full Article headline hacker bank romania
9 FBI Arrests Five Over 'Hackers For Hire' Websites By packetstormsecurity.com Published On :: Mon, 27 Jan 2014 17:54:48 GMT Full Article headline hacker government india china cybercrime fraud romania fbi
9 ResourceSpace 6.4.5976 XSS / SQL Injection / Insecure Cookie Handling By packetstormsecurity.com Published On :: Thu, 11 Dec 2014 22:27:12 GMT ResourceSpace suffers from cross site scripting, html injection, insecure cookie handling, and remote SQL injection vulnerabilities. Versions 6.4.5976 and below are affected. Full Article
9 Red Hat Security Advisory 2020-1975-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:37 GMT Red Hat Security Advisory 2020-1975-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
9 Red Hat Security Advisory 2020-1979-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:52 GMT Red Hat Security Advisory 2020-1979-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
9 Red Hat Security Advisory 2020-1978-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:05 GMT Red Hat Security Advisory 2020-1978-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
9 Red Hat Security Advisory 2020-1980-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:13 GMT Red Hat Security Advisory 2020-1980-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
9 Latest Symantec CEO's 'Revolution' Could Axe 1,000 Jobs By packetstormsecurity.com Published On :: Thu, 24 Jan 2013 16:08:39 GMT Full Article headline virus symantec
9 Symantec: Don't Blame Us For New York Times Hack By packetstormsecurity.com Published On :: Fri, 01 Feb 2013 05:48:58 GMT Full Article headline hacker china data loss symantec
9 Latest Java Zero-Day Linked To Bit9 Compromise By packetstormsecurity.com Published On :: Sat, 02 Mar 2013 23:25:27 GMT Full Article headline hacker flaw symantec java
9 Google Makes Symantec An Offer It Can't Refuse By packetstormsecurity.com Published On :: Thu, 29 Oct 2015 15:42:12 GMT Full Article headline fraud google symantec cryptography
9 Google Will Remove Trust Of Symantec's PCA3-G1 Certificate By packetstormsecurity.com Published On :: Tue, 15 Dec 2015 01:05:58 GMT Full Article headline privacy google symantec cryptography
9 Symantec Flaws As Bad As It Gets, Claims Google's Project Zero By packetstormsecurity.com Published On :: Thu, 30 Jun 2016 02:19:04 GMT Full Article headline flaw google symantec backdoor
9 Symantec Won't Fix Catastrophic Flaws Until Mid-July By packetstormsecurity.com Published On :: Thu, 07 Jul 2016 13:39:59 GMT Full Article headline flaw symantec zero day
9 Mozilla Takes A Turn Slapping Symantec's Certification SNAFU By packetstormsecurity.com Published On :: Wed, 03 May 2017 14:20:37 GMT Full Article headline privacy google symantec mozilla cryptography
9 Hackers' Own Tools Are Full Of Vulnerabilities By packetstormsecurity.com Published On :: Wed, 26 Jul 2017 15:58:34 GMT Full Article headline hacker malware flaw symantec
9 Apple Security Advisory 2019-7-23-1 By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 18:22:22 GMT Apple Security Advisory 2019-7-23-1 - iCloud for Windows 7.13 is now available and addresses code execution and cross site scripting vulnerabilities. Full Article
9 Apple Security Advisory 2019-10-07-4 By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 20:44:48 GMT Apple Security Advisory 2019-10-07-4 - iCloud for Windows 7.14 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities. Full Article
9 Red Hat Security Advisory 2019-1790-01 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:10:26 GMT Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
9 Red Hat Security Advisory 2019-1942-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:17:37 GMT Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
9 Red Hat Security Advisory 2019-2097-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:11:21 GMT Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability. Full Article
9 Red Hat Security Advisory 2019-2400-01 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:08:30 GMT Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
9 Webmin 1.920 password_change.cgi Backdoor By packetstormsecurity.com Published On :: Fri, 23 Aug 2019 20:09:56 GMT This Metasploit module exploits a backdoor in Webmin versions 1.890 through 1.920. Only the SourceForge downloads were backdoored, but they are listed as official downloads on the project's site. Unknown attacker(s) inserted Perl qx statements into the build server's source code on two separate occasions: once in April 2018, introducing the backdoor in the 1.890 release, and in July 2018, reintroducing the backdoor in releases 1.900 through 1.920. Only version 1.890 is exploitable in the default install. Later affected versions require the expired password changing feature to be enabled. Full Article
9 Gentoo Linux Security Advisory 201909-01 By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 22:21:33 GMT Gentoo Linux Security Advisory 201909-1 - Multiple vulnerabilities have been found in Perl, the worst of which could result in the arbitrary execution of code. Versions less than 5.28.2 are affected. Full Article
9 It's Hacker Summer Camp This Week - Expect Searches For Guns In Your Hotel Room By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 14:42:12 GMT Full Article headline hacker government usa terror conference
9 Barr Pushes Apple For Help To Unlock Gunman's Phone By packetstormsecurity.com Published On :: Tue, 14 Jan 2020 15:50:39 GMT Full Article headline government privacy usa phone apple terror
9 Cybersecurity Lacking At Most Of The World's Major Airports By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:28:20 GMT Full Article headline hacker privacy data loss flaw terror
9 Hospitals Must Secure Vital Backend Networks Before It's Too Late By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:06:46 GMT Full Article headline hacker privacy
9 IBM Bigfix Platform 9.5.9.62 Arbitary File Upload / Code Execution By packetstormsecurity.com Published On :: Mon, 07 Oct 2019 14:41:32 GMT IBM Bigfix Platform version 9.5.9.62 suffers from an arbitrary file upload vulnerability as root that can achieve remote code execution. Full Article
9 Playable 9.18 Script Insertion / Arbitrary File Upload By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:28:08 GMT Playable version 9.18 for iOS suffers from script insertion and arbitrary file upload vulnerabilities. Full Article
9 Google Reveals Samsung Galaxy S6 Edge's Security Flaws By packetstormsecurity.com Published On :: Wed, 04 Nov 2015 16:21:26 GMT Full Article headline phone flaw google samsung
9 FAA Considers A Ban On Samsung's Exploding Smartphones By packetstormsecurity.com Published On :: Thu, 08 Sep 2016 13:26:03 GMT Full Article headline phone flaw samsung
9 Apple, Samsung, Microsoft React To Wikileaks' CIA Dump By packetstormsecurity.com Published On :: Wed, 08 Mar 2017 14:22:09 GMT Full Article headline government microsoft usa data loss flaw spyware apple cia samsung
9 Court Finds FBI Use Of NSA Database Violated Americans' 4th Amendment Rights By packetstormsecurity.com Published On :: Wed, 09 Oct 2019 14:05:38 GMT Full Article headline government privacy usa data loss spyware fbi nsa
9 4 US Agencies Don't Properly Verify Your Data Due To The Equifax Breach By packetstormsecurity.com Published On :: Fri, 14 Jun 2019 16:08:03 GMT Full Article headline government privacy usa data loss fraud identity theft
9 You're Probably Not Going To Get $125 From The Equifax Settlement By packetstormsecurity.com Published On :: Thu, 01 Aug 2019 16:48:05 GMT Full Article headline government privacy bank usa data loss identity theft
9 These Are The 29 Countries Vulnerable To SIM Jacker Attacks By packetstormsecurity.com Published On :: Mon, 14 Oct 2019 14:30:07 GMT Full Article headline hacker phone cybercrime fraud password identity theft
9 Major Vuln Patched In The EU's elDAS Auth System By packetstormsecurity.com Published On :: Tue, 29 Oct 2019 13:48:01 GMT Full Article headline government flaw identity theft
9 The Best And Worst Of Black Hat 2019 By packetstormsecurity.com Published On :: Mon, 12 Aug 2019 16:45:04 GMT Full Article headline usa conference
9 COVID-19 Visited The RSA Conference This Year By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 13:51:23 GMT Full Article headline virus conference rsa
9 Ubuntu Security Notice USN-4279-2 By packetstormsecurity.com Published On :: Thu, 20 Feb 2020 17:44:31 GMT Ubuntu Security Notice 4279-2 - USN-4279-1 fixed vulnerabilities in PHP. The updated packages caused a regression. This update fixes the problem. It was discovered that PHP incorrectly handled certain scripts. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04 LTS. It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information. It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 19.10. Various other issues were also addressed. Full Article
9 PHP-Fusion CMS 9.03 Cross Site Scripting By packetstormsecurity.com Published On :: Wed, 26 Feb 2020 19:33:33 GMT PHP-Fusion CMS versions 9 through 9.03 suffer from multiple cross site scripting vulnerabilities. Full Article
9 rConfig 3.93 Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 18:22:22 GMT rConfig version 3.93 suffers from an authenticated ajaxAddTemplate.php remote code execution vulnerability. Full Article
9 PHPKB Multi-Language 9 image-upload.php Code Execution By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:57:49 GMT PHPKB Multi-Language 9 suffers from an image-upload.php remote authenticated code execution vulnerability. Full Article
9 rConfig 3.9.4 Remote Command Injection By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:08:06 GMT rConfig version 3.9.4 suffers from a search.crud.php remote command injection vulnerability. Full Article
9 PHP-Fusion 9.03.50 Arbitrary File Upload By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:39:52 GMT PHP-Fusion version 9.03.50 suffers from an arbitrary file upload vulnerability. Full Article
9 FreeBSD Security Advisory - FreeBSD-SA-19:08.rack By packetstormsecurity.com Published On :: Fri, 21 Jun 2019 18:32:22 GMT FreeBSD Security Advisory - While processing acknowledgements, the RACK code uses several linked lists to maintain state entries. A malicious attacker can cause the lists to grow unbounded. This can cause an expensive list traversal on every packet being processed, leading to resource exhaustion and a denial of service. An attacker with the ability to send specially crafted TCP traffic to a victim system can degrade network performance and/or consume excessive CPU by exploiting the inefficiency of traversing the potentially very large RACK linked lists with relatively small bandwidth cost. Full Article