Lucene search

K

Accept Stripe Donation – AidWP Security Vulnerabilities

threatpost
threatpost

Adobe Releases Malware Classifier Tool

Adobe has published a free tool that can help administrators and security researchers classify suspicious files as malicious or benign, using specific machine-learning algorithms. The tool is a command-line utility that Adobe officials hope will make binary classification a little easier. Adobe...

0.2AI Score

2012-04-02 03:40 PM
13
exploitpack
exploitpack

WordPress Plugin Donation 1.0 - SQL Injection

WordPress Plugin Donation 1.0 - SQL...

0.2AI Score

2011-09-01 12:00 AM
7
patchstack
patchstack

WordPress Donation Plugin <= 1.0 - SQL Injection

Donation plugin is prone to an SQL injection. This vulnerability allows an attacker to modify data, alter queries to the application SQL database, compromise the access and application or exploit hidden vulnerabilities in the underlying database. Solution Upgrade the...

3.3AI Score

2011-09-01 12:00 AM
3
packetstorm

0.1AI Score

2011-09-01 12:00 AM
15
exploitdb

7.4AI Score

2011-09-01 12:00 AM
14
threatpost
threatpost

Researchers: Square Card Reader Provides Straight Line to Illicit Cash?

Security researchers at the Black Hat Briefings demonstrated a method for turning purloined credit card information into cash, this time using Square, a free credit card reader that promises to turn anyone with a mobile device into a merchant capable of accepting credit card payments. Adam Laurie.....

-0.3AI Score

2011-08-05 01:02 AM
4
oraclelinux
oraclelinux

Oracle Linux 5.7 kernel security and bug fix update

[2.6.18-274.el5] - [xen] svm: fix invlpg emulator regression (Paolo Bonzini) [719894] [2.6.18-273.el5] - Revert: [fs] proc: Fix rmmod/read/write races in /proc entries (Jarod Wilson) [717068] - [xen] disregard trailing bytes in an invalid page (Paolo Bonzini) [717742] - [xen] prep...

-0.3AI Score

0.062EPSS

2011-07-31 12:00 AM
32
thn
thn

Paypal gives FBI the list of IP Address of 1,000 Anomymous hackers

Paypal gives FBI the list of IP Address of 1,000 Anomymous hackers Paypal collected 1000 IP addresses of those carrying out Anonymous' DDoS attacks against PayPal last December. To be fair the names on the list will probably be the bottom feeding script kiddies rather than the hackers at...

6.8AI Score

2011-07-28 08:19 PM
4
threatpost
threatpost

U.S. Playing Catch Up in Security for Contactless Devices

AMHERST, MASS.– The U.S. may boast the world’s largest economy, richest technology companies and a lion’s share of its top research universities. But when it comes to the subject of security of RFID (Radio Frequency ID) and other contactless technologies, America is still playing catch-up. The...

-0.8AI Score

2011-06-27 06:40 PM
5
thn
thn

Website collecting donations for Japan hacked !

Hackers took down the website of a Tennessee nonprofit that was collecting donations for Japan and replaced the home page with profanity. Japan-America Society of Tennessee executive director Leigh Weiland said hackers broke into the site sometime Wednesday night. The group's web-hosting...

6.8AI Score

2011-03-19 08:03 AM
4
zdt
zdt

Tomato Gallery 1.2 (logged only) Persistant Xss Vunerability

Exploit for php platform in category web...

7.1AI Score

2011-02-22 12:00 AM
21
thn
thn

Virus writer donates money to Chinese pandas Security !

The Chinese man jailed for writing the 'Fujacks' worm in 2006 appears to be trying to rehabilitate his public image, reportedly making made a donation to a panda research centre in the country. Li Jun was arrested in February 2007 and charged with writing and selling the "Panda Burning Joss...

6.6AI Score

2010-12-16 02:28 PM
5
thn
thn

Genesco's Credit Card Processing System Hacked !

Specialty retailer Genesco Inc. said Friday that it suffered a criminal intrusion into the part of its computer network that processes payment card transactions and certain details of cards might have been compromised, but added that the intrusion was likely contained after the company took...

6.8AI Score

2010-12-12 03:10 AM
3
threatpost
threatpost

Wikileaks Roundup: Assange Arrested, Visa, MC Cut Ties

OK. It’s been just over a week since information leaking Web site Wikileaks released the first installment of leaked U.S. diplomatic cables, with each day bringing new documents from the purported hoard of some 250,000 pages, and new developments from a range of very pissed off Western...

-0.2AI Score

2010-12-07 04:48 PM
5
threatpost
threatpost

iPhone Jailbreak Tool Sets Stage for Mobile Malware

SAN DIEGO–The success of a group of hackers in compromising the security of Apple’s iPhone may set the stage for more malware for the popular handset, including rootkit-style remote monitoring tools and data stealing malware. In a presentation at the ToorCon Hacking Conference here on Saturday,...

-0.3AI Score

2010-10-23 06:54 AM
7
threatpost
threatpost

Researcher Develops Small Device to Intercept, Modify Electronic Payments

With bank fraud and attacks against financial institutions and online banking applications having turned into an epidemic, researchers, banks and other concerned parties have been looking for new ways to protect the integrity of financial transactions. A researcher at the University of Cambridge...

0.3AI Score

2010-10-21 07:04 PM
10
threatpost
threatpost

Researchers Find Weaknesses in Magstripe Gift Cards

It’s not just credit cards and debit cards that are at risk of fraud: pre-paid gift cards can also easily be cloned and stolen by cybercriminals, according to newly published research [pdf] from U.K-based Corsaire. The researchers found that the magnetic-stripe technology used for gift cards and...

0.6AI Score

2009-10-27 02:54 PM
11
threatpost
threatpost

An Open Letter to Heartland CEO Robert Carr

Mr. Carr, I read your interview with Bill Brenner in CSO magazine today, and I sympathize with your situation. I completely agree that the current system of standards and audits contained in the Payment Card Industry Data Security Standard is flawed and unreliable as a breach-prevention mechanism.....

0.7AI Score

2009-08-13 03:20 PM
4
securityvulns
securityvulns

CakePHP 1.1.20 Local File Inclusion Vulnerability

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + + CakePHP 1.1.20 Local File Inclusion Vulnerability + ...

1.1AI Score

2009-07-06 12:00 AM
45
packetstorm

-0.2AI Score

2009-07-06 12:00 AM
22
threatpost
threatpost

Data-sniffing trojans hit Eastern European ATMs

From The Register (Dan Goodin) Security experts have discovered a family of data-stealing trojans that have burrowed into automatic teller machines in Eastern Europe over the past 18 months. The malware logs the magnetic-stripe data and personal identification number of cards used at an infected...

1.3AI Score

2009-06-04 01:50 PM
6
prion
prion

Design/Logic Flaw

Robin Rawson-Tetley Animal Shelter Manager (ASM) before 2.2.2 does not properly enforce the privileges of user accounts, which allows local users to bypass intended access restrictions by (1) opening unspecified screens, related to the "double click selector bug"; or modifying a (2) animal, (3)...

7AI Score

0.0004EPSS

2009-02-11 12:30 AM
2
cvelist
cvelist

CVE-2008-6109

Robin Rawson-Tetley Animal Shelter Manager (ASM) before 2.2.2 does not properly enforce the privileges of user accounts, which allows local users to bypass intended access restrictions by (1) opening unspecified screens, related to the "double click selector bug"; or modifying a (2) animal, (3)...

6.8AI Score

0.0004EPSS

2009-02-11 12:00 AM
1
packetstorm
packetstorm

Lanius CMS 0.5.1 XSRF

...

0.1AI Score

2009-02-10 12:00 AM
35
oraclelinux
oraclelinux

Oracle Enterprise Linux 5.3 kernel security and bug fix update

[2.6.18-128.el5] - [cifs] cifs_writepages may skip unwritten pages (Jeff Layton ) [470267] [2.6.18-127.el5] - Revert: [i386]: check for dmi_data in powernow_k8 driver (Prarit Bhargava ) [476184] - [xen] re-enable using xenpv in boot path for FV guests (Don Dutile ) [473899] - [xen] pv_hvm: guest...

-0.2AI Score

0.663EPSS

2009-01-27 12:00 AM
44
packetstorm
packetstorm

intertech-sql.txt

...

-0.3AI Score

2008-09-23 12:00 AM
18
myhack58
myhack58

Meiping network management family of software vulnerability completely analyze-vulnerability warning-the black bar safety net

My home city, Internet Cafe 1 0 0% with meiping network management system, no way! Also it is only the first look at Mae ping, also hope everyone to the sea Han it! Meiping network management software series actually also should be considered several network management software one! Reputation...

-0.5AI Score

2007-09-25 12:00 AM
17
myhack58
myhack58

On a write MD5 online hack website-vulnerability warning-the black bar safety net

| http://www.md5lookup.com/ (digital crack the better) http://md5.rednoize.com/ (the letters to crack the better) http://nz.md5.crysm.net/ (from 1 to 4 digits)- seems off. http://us.md5.crysm.net/ (American-British dictionary crack collection and IP address) http://www.xmd5.org/ (digital crack...

0.1AI Score

2006-12-10 12:00 AM
31
securityvulns
securityvulns

have you ever been BluePIMped?

have you ever been BluePIMped? Exploiting The Widcomm BTStackServer by KF (kf_lists[at]digitalmunition[dot]com) On August 12, 2004 Ryan Naraine of internetnews.com described a serious vulnerability in Widcomm's widely deployed Bluetooth Connectivity Software. It was said that this new threat ...

-0.2AI Score

2005-12-05 12:00 AM
10
securityvulns
securityvulns

Sudo version 1.6.8p9 now available, fixes security issue.

Sudo version 1.6.8, patchlevel 9 is now available, which fixes a race condition in Sudo's pathname validation. This is a security issue. Summary: A race condition in Sudo's command pathname handling prior to Sudo version 1.6.8p9 that could allow a user with Sudo privileges to run...

0.4AI Score

2005-06-20 12:00 AM
19
Total number of security vulnerabilities980