ed UK Whitehats Blacklisted By Cisco Talos By packetstormsecurity.com Published On :: Thu, 13 Dec 2018 17:18:54 GMT Full Article headline malware flaw cisco
ed Over 20k Linksys Routers Leak Every Device Ever Connected By packetstormsecurity.com Published On :: Mon, 20 May 2019 14:43:25 GMT Full Article headline privacy data loss flaw cisco
ed Webex Bug Allowed Password Bypass By packetstormsecurity.com Published On :: Tue, 28 Jan 2020 15:39:43 GMT Full Article headline privacy flaw password cisco
ed Venmo Transaction Scraped In Privacy Warning To Consumers By packetstormsecurity.com Published On :: Tue, 18 Jun 2019 15:59:58 GMT Full Article headline privacy bank cybercrime data loss fraud flaw paypal
ed Windscribe WindscribeService Named Pipe Privilege Escalation By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:54:05 GMT The Windscribe VPN client application for Windows makes use of a Windows service WindscribeService.exe which exposes a named pipe \.pipeWindscribeService allowing execution of programs with elevated privileges. Windscribe versions prior to 1.82 do not validate user-supplied program names, allowing execution of arbitrary commands as SYSTEM. This Metasploit module has been tested successfully on Windscribe versions 1.80 and 1.81 on Windows 7 SP1 (x64). Full Article
ed Red Hat Security Advisory 2019-1790-01 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:10:26 GMT Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
ed Red Hat Security Advisory 2019-1942-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:17:37 GMT Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
ed Red Hat Security Advisory 2019-2097-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:11:21 GMT Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability. Full Article
ed Red Hat Security Advisory 2019-2400-01 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:08:30 GMT Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
ed Red Hat Security Advisory 2020-1616-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:22:15 GMT Red Hat Security Advisory 2020-1616-01 - Irssi is a modular IRC client with Perl scripting. Issues addressed include a use-after-free vulnerability. Full Article
ed Amadeus Airline Check-In Bug Exposed Boarding Passes By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 13:53:49 GMT Full Article headline privacy data loss spyware terror
ed Lights That Warn Planes Of Obstacles Were Exposed To Open Internet By packetstormsecurity.com Published On :: Fri, 22 Nov 2019 15:38:21 GMT Full Article headline hacker flaw terror
ed Feds Once Again Demand Apple Unlock Encrypted iPhones By packetstormsecurity.com Published On :: Wed, 08 Jan 2020 16:25:50 GMT Full Article headline government privacy usa phone apple terror fbi cryptography
ed FBI Arrests Man Suspected Of Dozens Of Swatting Calls By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 17:03:43 GMT Full Article headline fraud terror fbi
ed Tesla Autopilot Duped By Phantom Images By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 17:05:20 GMT Full Article headline flaw terror
ed US-Wanted Algerian Hacker Arrested In Thailand By packetstormsecurity.com Published On :: Mon, 07 Jan 2013 15:06:52 GMT Full Article headline hacker government usa thailand algeria
ed Enhanced Multimedia Router 3.0.4.27 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:50:22 GMT Enhanced Multimedia Router version 3.0.4.27 suffers from a cross site request forgery vulnerability. Full Article
ed Red Hat Security Advisory 2020-1050-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:05:46 GMT Red Hat Security Advisory 2020-1050-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include a cross site request forgery vulnerability. Full Article
ed QRadar Community Edition 7.3.1.6 CSRF / Weak Access Control By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 19:57:06 GMT QRadar Community Edition version 7.3.1.6 suffers from cross site request forgery and weak access control vulnerabilities. Full Article
ed Edimax EW-7438RPn Cross Site Request Forgery By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:06:13 GMT Edimax EW-7438RPn suffers from a cross site request forgery vulnerability. Full Article
ed FBI Possibly Backdoored OpenBSD IPSEC Stack By packetstormsecurity.com Published On :: Wed, 15 Dec 2010 16:36:40 GMT Full Article headline fbi backdoor openbsd
ed Cisco Data Center Network Manager Unauthenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 02 Sep 2019 18:04:06 GMT DCNM exposes a file upload servlet (FileUploadServlet) at /fm/fileUpload. An authenticated user can abuse this servlet to upload a WAR to the Apache Tomcat webapps directory and achieve remote code execution as root. This module exploits two other vulnerabilities, CVE-2019-1619 for authentication bypass on versions 10.4(2) and below, and CVE-2019-1622 (information disclosure) to obtain the correct directory for the WAR file upload. This module was tested on the DCNM Linux virtual appliance 10.4(2), 11.0(1) and 11.1(1), and should work on a few versions below 10.4(2). Only version 11.0(1) requires authentication to exploit (see References to understand why). Full Article
ed Smart TVs Riddled With DUMB Security Holes By packetstormsecurity.com Published On :: Thu, 06 Jun 2013 15:10:35 GMT Full Article headline flaw samsung
ed Samsung Galaxy Is Backdoored? By packetstormsecurity.com Published On :: Thu, 13 Mar 2014 07:09:40 GMT Full Article headline phone flaw backdoor samsung
ed Galaxy S5 Fingerprint Scanner Hacked With Glue Mould By packetstormsecurity.com Published On :: Wed, 16 Apr 2014 15:14:00 GMT Full Article headline phone flaw identity theft samsung
ed Samsung Find My Phone Severely Flawed By packetstormsecurity.com Published On :: Wed, 29 Oct 2014 13:14:32 GMT Full Article headline phone flaw samsung
ed Samsung S5 Fingerprint Flaw Exposed By packetstormsecurity.com Published On :: Thu, 23 Apr 2015 13:48:58 GMT Full Article headline hacker flaw samsung
ed Samsung LoopPay Was Hacked In March This Year By packetstormsecurity.com Published On :: Thu, 08 Oct 2015 16:20:21 GMT Full Article headline bank cybercrime data loss fraud flaw samsung
ed Google Reveals Samsung Galaxy S6 Edge's Security Flaws By packetstormsecurity.com Published On :: Wed, 04 Nov 2015 16:21:26 GMT Full Article headline phone flaw google samsung
ed Flaw In Samsung Pay Lets Hackers Wirelessly Skim Credit Cards By packetstormsecurity.com Published On :: Sat, 06 Aug 2016 18:03:29 GMT Full Article headline bank cybercrime fraud flaw samsung
ed Sprint Says Hackers Breached Customer Accounts Via Samsung Website By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 13:53:44 GMT Full Article headline hacker privacy phone data loss samsung
ed Edward Snowden Is Releasing A Memoir Later This Year By packetstormsecurity.com Published On :: Thu, 01 Aug 2019 16:48:00 GMT Full Article headline government privacy usa phone russia data loss cyberwar spyware nsa
ed FBI, NSA To Hackers: Let Us Be Blunt, Weed Need Your Help By packetstormsecurity.com Published On :: Thu, 08 Aug 2019 14:23:43 GMT Full Article headline hacker government usa fbi nsa
ed Court Finds FBI Use Of NSA Database Violated Americans' 4th Amendment Rights By packetstormsecurity.com Published On :: Wed, 09 Oct 2019 14:05:38 GMT Full Article headline government privacy usa data loss spyware fbi nsa
ed Kaspersky Identifies APT Mentioned In 2017 Shadow Brokers Leak By packetstormsecurity.com Published On :: Tue, 05 Nov 2019 15:11:59 GMT Full Article headline hacker government malware usa russia cyberwar nsa
ed The NSA Has Discovered A Major Flaw In Windows 10 By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 17:03:48 GMT Full Article headline government microsoft usa flaw zero day nsa
ed Critical Windows Vuln Used To Rickroll The NSA And Github By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:22:30 GMT Full Article headline privacy microsoft flaw nsa cryptography
ed Option Way Exposed Personal Info On Customers By packetstormsecurity.com Published On :: Wed, 04 Sep 2019 13:52:48 GMT Full Article headline privacy data loss identity theft
ed Major Vuln Patched In The EU's elDAS Auth System By packetstormsecurity.com Published On :: Tue, 29 Oct 2019 13:48:01 GMT Full Article headline government flaw identity theft
ed Wawa POS System Compromised For 10 Months By packetstormsecurity.com Published On :: Sat, 21 Dec 2019 06:48:53 GMT Full Article headline hacker malware bank cybercrime fraud identity theft
ed Data Leak Strikes US Cannabis Users, Sensitive Info Exposed By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 15:57:37 GMT Full Article headline privacy data loss identity theft
ed Things Learned From Monitoring Traffic At Defcon By packetstormsecurity.com Published On :: Mon, 12 Aug 2019 16:45:24 GMT Full Article headline privacy wireless conference
ed We Asked Def Con Attendees Why People Are Still Getting Hacked By packetstormsecurity.com Published On :: Fri, 16 Aug 2019 16:22:40 GMT Full Article headline hacker conference
ed DEF CON China Cancelled Due To Coronavirus By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 15:36:00 GMT Full Article headline virus china conference
ed Black Hat Asia 2020 Postponed Due To Coronavirus Concerns By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 14:43:21 GMT Full Article headline china conference
ed COVID-19 Visited The RSA Conference This Year By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 13:51:23 GMT Full Article headline virus conference rsa
ed rConfig 3.93 Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 18:22:22 GMT rConfig version 3.93 suffers from an authenticated ajaxAddTemplate.php remote code execution vulnerability. Full Article
ed Horde Groupware Webmail Edition 5.2.22 PHP File Inclusion By packetstormsecurity.com Published On :: Thu, 12 Mar 2020 20:10:33 GMT Horde Groupware Webmail Edition version 5.2.22 suffers from a PHP file inclusion vulnerability. Full Article
ed Red Hat Security Advisory 2020-1112-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 14:58:12 GMT Red Hat Security Advisory 2020-1112-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Issues addressed include a cross site scripting vulnerability. Full Article
ed PlaySMS index.php Unauthenticated Template Injection Code Execution By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:55:45 GMT This Metasploit module exploits a preauth Server-Side Template Injection vulnerability that leads to remote code execution in PlaySMS before version 1.4.3. This issue is caused by double processing a server-side template with a custom PHP template system called TPL which is used in the PlaySMS template engine at src/Playsms/Tpl.php:_compile(). The vulnerability is triggered when an attacker supplied username with a malicious payload is submitted. This malicious payload is then stored in a TPL template which when rendered a second time, results in code execution. Full Article