Lucene search

K

Accept Stripe Donation – AidWP Security Vulnerabilities

ciscothreats
ciscothreats

Threat Outbreak Alert RuleID11115: Email Messages Distributing Malicious Software on August 14, 2014

Medium Alert ID: 35297 First Published: 2014 August 14 14:34 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages distributing malicious software. Email messages that are related to this threat (RuleID11115) may contain the following...

0.5AI Score

2014-08-14 02:34 PM
7
coalfire
coalfire

Keeping your restaurant & hospitality Cardholder Data Environment safe

Reports of new credit card data breaches seem to be in the news daily. Recent high profile breaches within major retailers this year should serve as a wake-up call to the restaurant and hospitality industries. As a result of having high volumes of credit card transactions and decentralized...

0.8AI Score

2014-08-12 09:06 AM
6
hackerone
hackerone

Slack: Content Spoofing all Integrations in https://team.slack.com/services/new/

Hello There, I've discovered 48+ content spoofing and confirmed all of your Integrations at https://team.slack.com/services/new/ is vulnerable to Content spoofing and exploitable to all users. Content Spoofing An attack technique used to trick a user into thinking that fake web site content is...

-0.1AI Score

2014-08-01 03:11 PM
30
wpvulndb
wpvulndb

Donation <= 1.0 - SQL Injection

The WordPress Donation Plugin with Goals and Paypal IPN by NonprofitCMS.org WordPress plugin was affected by a SQL Injection security...

2.3AI Score

2014-08-01 10:58 AM
2
hackerone
hackerone

Slack: Content spoofing at Stripe Integrations

I have found Content Spoofing Vulnerable in Slack at Stripe Integrations vulnerability is exploitable to all users Proof of concept: https://asdasda.slack.com/services/2481499413?error=content%20spoofing%20! Regards, Jayson...

1.9AI Score

2014-07-23 08:06 PM
14
seebug
seebug

WordPress Donation plugin <= 1.0 - SQL Injection

No description provided by...

7.1AI Score

2014-07-01 12:00 AM
11
nessus
nessus

openSUSE Security Update : kernel (openSUSE-SU-2013:1971-1)

The Linux Kernel was updated to fix various security issues and bugs. sctp: Use correct sideffect command in duplicate cookie handling (bnc#826102, CVE-2013-2206). Drivers: hv: util: Fix a bug in util version negotiation code (bnc#838346). vmxnet3: prevent div-by-zero panic when ring...

-0.4AI Score

0.741EPSS

2014-06-13 12:00 AM
21
thn
thn

Fraudsters Physically Deploy Malicious Software to Hack ATMs

Criminals will not let any way to cheat an ATM machine out of its cash, as it’s one of the easiest way for them to get the hands on cash. ATM skimmers have now discovered a new and high-tech approach to target cash machines directly by inserting a physical notorious device into it instead....

6.8AI Score

2014-05-31 03:52 AM
15
thn
thn

Pre-Play Vulnerability Allows Chip-and-PIN Payment Card Cloning

In March this year, we reported that the major card distributor companies, VISA and Mastercard are migrating to EMV chip cards, also known as PIN-and-Chip cards. Unlike traditional magnetic stripe payment cards, EMV chip cards generates a unique code for every transaction, making it nearly*...

6.8AI Score

2014-05-20 06:43 AM
10
thn
thn

Target finally Plans to issue Chip and PIN Credit Cards

The massive data breaches in U.S largest retailers 'Target', marked the largest card heists in the U.S. history in which financial credentials of more than 110 million customers were compromised, have forced the retailer to take step towards more secure transactions. The retailer company on...

7.1AI Score

2014-04-30 05:38 AM
6
thn
thn

"4chan Hacked", Most Popular Image-Bulletin Board Compromised

The founder of 4chan, Christopher Poole, aka “moot” has confirmed few hours ago, in a blog post that the popular image-based bulletin board was hacked. The attacker gained access to the administrative functions and successfully hacked into one of 4chan’s database by exploiting a website's software....

6.7AI Score

2014-04-30 12:26 AM
13
threatpost
threatpost

3 Million Cards Implicated in Michaels Breach

Nearly four months after it first reported it was investigating a data breach, the arts and crafts retail chain Michaels confirmed yesterday that most of its U.S. stores were compromised on and off for eight months and that payment card information of nearly three million of its customers may have....

-0.4AI Score

2014-04-18 02:33 PM
10
thn
thn

Payment Card processing services upgrading to Chip-and-PIN and Point-to-Point Encryption

The massive data breaches in U.S retailers 'Target' and 'Neiman Marcus', in which financial credentials of more than 110 million and 1.1 million customers were compromised respectively, have put a spotlight on the need for more secure transactions. To tackle this issue, the two major payment card.....

7.1AI Score

2014-03-11 11:25 PM
8
thn
thn

OpenBSD Project survived after $20,000 Donation from Romanian Bitcoin Billionaire

Last year in the month of December the Security-focused Unix-like distribution 'OpenBSD' Foundation announced that it was facing shut down due to lack of funds to pay their electricity bills and dedicated Internet line costs. Theo de __Raadt, the founder of the OpenBSD project, and Bob Beck...

6.9AI Score

2014-01-21 12:48 AM
9
thn
thn

Barack Obama's Twitter, Facebook, Campaign website and Email Accounts hacked by Syrian Electronic Army

The pro-Assad group Syrian Electronic Army claims it has hacked the President Barack Obama's website , Twitter-Facebook accounts and access email accounts linked to Organizing For Action, the non-profit offshoot of Obama For America, Obama's 2012 campaign operation. Last night, Syrian Electronic...

6.7AI Score

2013-10-28 05:45 PM
4
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Payroll Invoice Email Messages on June 11, 2014

Medium Alert ID: 31268 First Published: 2013 October 15 19:34 GMT Last Updated: 2014 June 12 12:44 GMT Version: 61 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain payroll invoice details for the recipient. The text in the email...

0.3AI Score

2013-10-15 07:34 PM
5
thn
thn

Hacker jailed for ATM skimming invented ATM security scheme

A Romanian man serving a five-year jail sentence in Romania for his involvement in an ATM skimming scheme, has developed a device designed to protect ATMs from such attacks. 33-year-old Valentin Boanta who is being detained in a prison from Vaslui, Romania, after he was convicted on charges of...

6.7AI Score

2013-05-19 04:38 PM
thn
thn

Hacker jailed for ATM skimming invented ATM security scheme

A Romanian man serving a five-year jail sentence in Romania for his involvement in an ATM skimming scheme, has developed a device designed to protect ATMs from such attacks. 33-year-old Valentin Boanta who is being detained in a prison from Vaslui, Romania, after he was convicted on charges of...

6.7AI Score

2013-05-19 05:38 AM
8
threatpost
threatpost

Apparel Company Files Landmark Lawsuit Against Visa in PCI Dispute

A Tennessee-based footwear and apparel company has filed a $13 million lawsuit against Visa for what it considers random, subjective penalties for being out of compliance with the Payment Card Industry (PCI) standard the credit card company regulates. Last week Nashville-based Genesco, which...

0.8AI Score

2013-03-13 01:21 AM
8
thn
thn

CTF365 – Capture The Flag – Next Generation

Prepare your tools, build your team, defend your country and conquer the World. It is well known that the best way to learn security is hands on. It's the kind of experience you earn in pentest labs or CTF competitions based on challenges or defensive and offensive security and it's aimed at...

6.7AI Score

2012-11-19 05:35 PM
3
threatpost
threatpost

International Cyber Crime Takedown Said to Be Largest of Its Kind

A two-year undercover operation today netted two dozen arrests in eight countries in what federal authorities say is the largest coordinated international takedown in history directed at those who traffic stolen financial data through online forums. The investigation uncovered 411,000 compromised.....

-0.5AI Score

2012-06-27 02:14 AM
5
thn
thn

Julian Assange and Bradley Manning are Vested in Vision !

Julian Assange and Bradley Manning are Vested in Vision ! Two significant events will take place this week and cyber activists need to take note and pay attention. This will be your training on how to unfold the growing revolution that is spinning our world on a new and courageous path. First,...

6.7AI Score

2012-04-17 07:41 AM
3
threatpost
threatpost

Adobe Releases Malware Classifier Tool

Adobe has published a free tool that can help administrators and security researchers classify suspicious files as malicious or benign, using specific machine-learning algorithms. The tool is a command-line utility that Adobe officials hope will make binary classification a little easier. Adobe...

0.2AI Score

2012-04-02 03:40 PM
13
exploitpack
exploitpack

WordPress Plugin Donation 1.0 - SQL Injection

WordPress Plugin Donation 1.0 - SQL...

0.2AI Score

2011-09-01 12:00 AM
8
patchstack
patchstack

WordPress Donation Plugin <= 1.0 - SQL Injection

Donation plugin is prone to an SQL injection. This vulnerability allows an attacker to modify data, alter queries to the application SQL database, compromise the access and application or exploit hidden vulnerabilities in the underlying database. Solution Upgrade the...

3.3AI Score

2011-09-01 12:00 AM
3
packetstorm

0.1AI Score

2011-09-01 12:00 AM
16
exploitdb

7.4AI Score

2011-09-01 12:00 AM
14
threatpost
threatpost

Researchers: Square Card Reader Provides Straight Line to Illicit Cash?

Security researchers at the Black Hat Briefings demonstrated a method for turning purloined credit card information into cash, this time using Square, a free credit card reader that promises to turn anyone with a mobile device into a merchant capable of accepting credit card payments. Adam Laurie.....

-0.3AI Score

2011-08-05 01:02 AM
4
oraclelinux
oraclelinux

Oracle Linux 5.7 kernel security and bug fix update

[2.6.18-274.el5] - [xen] svm: fix invlpg emulator regression (Paolo Bonzini) [719894] [2.6.18-273.el5] - Revert: [fs] proc: Fix rmmod/read/write races in /proc entries (Jarod Wilson) [717068] - [xen] disregard trailing bytes in an invalid page (Paolo Bonzini) [717742] - [xen] prep...

-0.3AI Score

0.062EPSS

2011-07-31 12:00 AM
32
thn
thn

Paypal gives FBI the list of IP Address of 1,000 Anomymous hackers

Paypal gives FBI the list of IP Address of 1,000 Anomymous hackers Paypal collected 1000 IP addresses of those carrying out Anonymous' DDoS attacks against PayPal last December. To be fair the names on the list will probably be the bottom feeding script kiddies rather than the hackers at...

6.8AI Score

2011-07-28 08:19 PM
4
threatpost
threatpost

U.S. Playing Catch Up in Security for Contactless Devices

AMHERST, MASS.– The U.S. may boast the world’s largest economy, richest technology companies and a lion’s share of its top research universities. But when it comes to the subject of security of RFID (Radio Frequency ID) and other contactless technologies, America is still playing catch-up. The...

-0.8AI Score

2011-06-27 06:40 PM
5
thn
thn

Website collecting donations for Japan hacked !

Hackers took down the website of a Tennessee nonprofit that was collecting donations for Japan and replaced the home page with profanity. Japan-America Society of Tennessee executive director Leigh Weiland said hackers broke into the site sometime Wednesday night. The group's web-hosting...

6.8AI Score

2011-03-19 08:03 AM
4
zdt
zdt

Tomato Gallery 1.2 (logged only) Persistant Xss Vunerability

Exploit for php platform in category web...

7.1AI Score

2011-02-22 12:00 AM
21
thn
thn

Former Hacker Li Jun Donates to Panda Research Center

In 2006, Li Jun, a Chinese man, was jailed for creating the ‘Fujacks’ worm. Recently, he appears to be attempting to rehabilitate his public image by making a donation to a panda research center in China. Li Jun was arrested in February 2007 and charged with writing and selling the "Panda Burning.....

6.8AI Score

2010-12-16 02:28 PM
7
thn
thn

Genesco Inc. Confirms Payment Card Data Breach in U.S. Stores

Specialty retailer Genesco Inc. announced on Friday that it experienced a criminal intrusion into the part of its computer network that processes payment card transactions. Some card details might have been compromised. However, the company quickly secured the affected network segment and...

7.1AI Score

2010-12-12 03:10 AM
3
threatpost
threatpost

Wikileaks Roundup: Assange Arrested, Visa, MC Cut Ties

OK. It’s been just over a week since information leaking Web site Wikileaks released the first installment of leaked U.S. diplomatic cables, with each day bringing new documents from the purported hoard of some 250,000 pages, and new developments from a range of very pissed off Western...

-0.2AI Score

2010-12-07 04:48 PM
5
thn
thn

Earn Rewards for Finding Security Flaws in Gmail, YouTube, and More

Google is on the hunt for hackers to find security vulnerabilities in popular web applications like Gmail, Blogger, and YouTube. The tech giant is offering rewards starting at $500 per bug. For vulnerabilities that are "severe or unusually clever," the payout can reach up to $3,133.70....

7.1AI Score

2010-11-06 01:17 AM
5
threatpost
threatpost

iPhone Jailbreak Tool Sets Stage for Mobile Malware

SAN DIEGO–The success of a group of hackers in compromising the security of Apple’s iPhone may set the stage for more malware for the popular handset, including rootkit-style remote monitoring tools and data stealing malware. In a presentation at the ToorCon Hacking Conference here on Saturday,...

-0.3AI Score

2010-10-23 06:54 AM
7
threatpost
threatpost

Researcher Develops Small Device to Intercept, Modify Electronic Payments

With bank fraud and attacks against financial institutions and online banking applications having turned into an epidemic, researchers, banks and other concerned parties have been looking for new ways to protect the integrity of financial transactions. A researcher at the University of Cambridge...

0.3AI Score

2010-10-21 07:04 PM
10
threatpost
threatpost

Researchers Find Weaknesses in Magstripe Gift Cards

It’s not just credit cards and debit cards that are at risk of fraud: pre-paid gift cards can also easily be cloned and stolen by cybercriminals, according to newly published research [pdf] from U.K-based Corsaire. The researchers found that the magnetic-stripe technology used for gift cards and...

0.6AI Score

2009-10-27 02:54 PM
12
threatpost
threatpost

An Open Letter to Heartland CEO Robert Carr

Mr. Carr, I read your interview with Bill Brenner in CSO magazine today, and I sympathize with your situation. I completely agree that the current system of standards and audits contained in the Payment Card Industry Data Security Standard is flawed and unreliable as a breach-prevention mechanism.....

0.7AI Score

2009-08-13 03:20 PM
5
securityvulns
securityvulns

CakePHP 1.1.20 Local File Inclusion Vulnerability

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + + CakePHP 1.1.20 Local File Inclusion Vulnerability + ...

1.1AI Score

2009-07-06 12:00 AM
46
packetstorm

-0.2AI Score

2009-07-06 12:00 AM
22
threatpost
threatpost

Data-sniffing trojans hit Eastern European ATMs

From The Register (Dan Goodin) Security experts have discovered a family of data-stealing trojans that have burrowed into automatic teller machines in Eastern Europe over the past 18 months. The malware logs the magnetic-stripe data and personal identification number of cards used at an infected...

1.3AI Score

2009-06-04 01:50 PM
6
cve
cve

CVE-2008-6109

Robin Rawson-Tetley Animal Shelter Manager (ASM) before 2.2.2 does not properly enforce the privileges of user accounts, which allows local users to bypass intended access restrictions by (1) opening unspecified screens, related to the "double click selector bug"; or modifying a (2) animal, (3)...

6.6AI Score

0.0004EPSS

2009-02-11 12:30 AM
21
nvd
nvd

CVE-2008-6109

Robin Rawson-Tetley Animal Shelter Manager (ASM) before 2.2.2 does not properly enforce the privileges of user accounts, which allows local users to bypass intended access restrictions by (1) opening unspecified screens, related to the "double click selector bug"; or modifying a (2) animal, (3)...

6.4AI Score

0.0004EPSS

2009-02-11 12:30 AM
prion
prion

Design/Logic Flaw

Robin Rawson-Tetley Animal Shelter Manager (ASM) before 2.2.2 does not properly enforce the privileges of user accounts, which allows local users to bypass intended access restrictions by (1) opening unspecified screens, related to the "double click selector bug"; or modifying a (2) animal, (3)...

7AI Score

0.0004EPSS

2009-02-11 12:30 AM
2
cvelist
cvelist

CVE-2008-6109

Robin Rawson-Tetley Animal Shelter Manager (ASM) before 2.2.2 does not properly enforce the privileges of user accounts, which allows local users to bypass intended access restrictions by (1) opening unspecified screens, related to the "double click selector bug"; or modifying a (2) animal, (3)...

6.4AI Score

0.0004EPSS

2009-02-11 12:00 AM
packetstorm
packetstorm

Lanius CMS 0.5.1 XSRF

...

0.1AI Score

2009-02-10 12:00 AM
35
oraclelinux
oraclelinux

Oracle Enterprise Linux 5.3 kernel security and bug fix update

[2.6.18-128.el5] - [cifs] cifs_writepages may skip unwritten pages (Jeff Layton ) [470267] [2.6.18-127.el5] - Revert: [i386]: check for dmi_data in powernow_k8 driver (Prarit Bhargava ) [476184] - [xen] re-enable using xenpv in boot path for FV guests (Don Dutile ) [473899] - [xen] pv_hvm: guest...

-0.2AI Score

0.663EPSS

2009-01-27 12:00 AM
44
Total number of security vulnerabilities1105