HylaFAX+ 5.2.4 - 5.5.3 - Buffer Overflow Vulnerability
Exploit for linux platform in category dos /...
-0.2AI Score
EPSS
6.5AI Score
EPSS
CVE-2130-5680, HylaFAX+ heap overflow, unchecked network traffic.
Details Application: "HylaFAX+" Version: 5.2.4 (April, 2008) through 5.5.3 (August 6, 2013) Type: Daemon that manages a fax server via an FTP-like protocol. Vendor / Maintainer: Lee Howard (faxguy at howardsilvan.com) Project Homepage: http://hylafax.sourceforge.net/ Vulnerability: CWE-120:...
0.1AI Score
EPSS
TIBCO Security Advisory: September 25, 2013 - TIBCOActiveMatrixBusinessWorks™
TIBCO ActiveMatrix BusinessWorks™ vulnerability Original release date: Sep 25, 2013 Lastrevised: -- CVE-2012-0687 Source: TIBCO SoftwareInc. TIBCO ActiveMatrix vulnerability Original release date: Sep 25, 2013 Last revised: -- Source: TIBCO Software Inc. Systems Affected TIBCO ActiveMatrix...
6.6AI Score
0.003EPSS
About SSV-ID: 4 4 7 4 POC analysis and reflection-vulnerability warning-the black bar safety net
SSV-ID: 4 4 7 4 SSV-AppDir: Discuz! Vulnerability Published: 2008-11-21 (GMT+0 8 0 0) URL: http://sebug.net/vuldb/ssvid-4474 A very old vulnerability, just as the study of penetration of a material of the bale, with its poc, the direct can be used, it feel so magical at the same time want to...
-0.3AI Score
Threat Outbreak Alert: Fake Incoming Money Transfer Notification Email Messages on March 23, 2015
Medium Alert ID: 30193 First Published: 2013 July 23 19:02 GMT Last Updated: 2015 March 24 13:27 GMT Version: 20 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain an incoming money transfer notification for the recipient. The text...
-0.1AI Score
6 0 degrees™ CMS official administrator of a dick. To submit a TICK to. Contact the author, and. The authors confirm, and then TICK the inside ignored. Be a dick and post it out Official download address:http://60du.net/index.html The core file is: administrator directory under check. asp | 1 2 3.....
1AI Score
Trend Micro DirectPass 1.5.0.1060 - Multiple Vulnerabilities
Title: Trend Micro DirectPass 1.5.0.1060 - Multiple Vulnerabilities Date: 2013-05-21 References: http://www.vulnerability-lab.com/get_content.php?id=894 Article: http://www.vulnerability-lab.com/dev/?p=580 Trend Micro (Reference): http://esupport.trendmicro.com/solution/en-US/1096805.aspx Trend...
AI Score
Microsoft handed over encrypted messages key and Skype calls access to NSA
New top secret documents provided by Edward Snowden exposed that Microsoft worked hand-in-hand with the United States government and handed the NSA access to encrypted messages and built a series of backdoors into Outlook.com, Skype, and SkyDrive to ease difficulties in accessing online...
6.5AI Score
Microsoft handed over encrypted messages key and Skype calls access to NSA
New top secret documents provided by Edward Snowden exposed that Microsoft worked hand-in-hand with the United States government and handed the NSA access to encrypted messages and built a series of backdoors into Outlook.com, Skype, and SkyDrive to ease difficulties in accessing online...
6.5AI Score
Threat Outbreak Alert: Fake Bank Payment Notification Email Messages on April 4, 2014
Low Alert ID: 29815 First Published: 2013 June 27 13:34 GMT Last Updated: 2014 April 7 11:33 GMT Version: 78 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a bank payment transfer notification for the recipient. The text in the...
0.5AI Score
Cracking iPhone Hotspot password in 50 Seconds
The ability to turn your iPhone into a Wi-Fi hotspot is a fantastically useful little tool in and of itself. When setting up a personal hotspot on their iPad or iPhone, users have the option of allowing iOS to automatically generate a password. According to a new study by Researchers at the...
6.7AI Score
LinkedIn was not Hacked, suffered outage due to DNS issue
The LinkedIn became inaccessible for an hour last night. Few Hours before App.net co-founder Bryan Berg posted that LinkedIn DNS was hijacked but later LinkedIn confirmed that they suffered outage due to DNS issue, not Hack. DNS Hijacking is an unauthorized modification of a DNS server or change...
6.9AI Score
Cracking iPhone Hotspot password in 50 Seconds
The ability to turn your iPhone into a Wi-Fi hotspot is a fantastically useful little tool in and of itself. When setting up a personal hotspot on their iPad or iPhone, users have the option of allowing iOS to automatically generate a password. According to a new study by Researchers at the...
6.7AI Score
LinkedIn was not Hacked, suffered outage due to DNS issue
The LinkedIn became inaccessible for an hour last night. Few Hours before App.net co-founder Bryan Berg posted that LinkedIn DNS was hijacked but later LinkedIn confirmed that they suffered outage due to DNS issue, not Hack. DNS Hijacking is an unauthorized modification of a DNS server or change...
6.9AI Score
BlackBerry Z10 Privilege Escalation Vulnerability
BlackBerry Z10 users should be aware that there is a privilege escalation vulnerability. The vulnerability potentially allows a hacker to modify or edit data on a stolen BlackBerry Z10 smartphone with BlackBerry Protect enabled, identified as BSRT-2013-006 (CVE-2013-3692) According to the...
7.3AI Score
0.019EPSS
BlackBerry Z10 Privilege Escalation Vulnerability
BlackBerry Z10 users should be aware that there is a privilege escalation vulnerability. The vulnerability potentially allows a hacker to modify or edit data on a stolen BlackBerry Z10 smartphone with BlackBerry Protect enabled, identified as BSRT-2013-006 (CVE-2013-3692) According to the...
6.8AI Score
0.019EPSS
Anonymous Hacker outs wanted Edmonton men for child exploitation
A YouTube video posted by a group calling themselves Anonymous is getting a lot of attention online, claims to have outed two men who allegedly tried to lure underaged girls over the internet. In a video posted on Friday, a member of Anonymous describes a sting operation in which two Edmonton-area....
6.6AI Score
New ZeuS Malware spreading automatically via USB Flash Drives
The notorious Zeus Trojan, a family of banking malware known for stealing passwords and draining the accounts of its victims, has steadily increased in recent months. The malware family itself is frequently updated with mechanisms designed to evade detection by antivirus and network security...
6.7AI Score
Anonymous Hacker outs wanted Edmonton men for child exploitation
A YouTube video posted by a group calling themselves Anonymous is getting a lot of attention online, claims to have outed two men who allegedly tried to lure underaged girls over the internet. In a video posted on Friday, a member of Anonymous describes a sting operation in which two Edmonton-area....
6.6AI Score
New ZeuS Malware spreading automatically via USB Flash Drives
The notorious Zeus Trojan, a family of banking malware known for stealing passwords and draining the accounts of its victims, has steadily increased in recent months. The malware family itself is frequently updated with mechanisms designed to evade detection by antivirus and network security...
6.7AI Score
Edward Snowden, whistleblower behind the NSA surveillance Program leak
The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. He's a high school dropout who worked his way into the most secretive....
6.5AI Score
Edward Snowden, whistleblower behind the NSA surveillance Program leak
The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. He's a high school dropout who worked his way into the most secretive....
6.5AI Score
7.4AI Score
Trend Micro DirectPass 1.5.0.1060 - Multiple Software Vulnerabilities
Trend Micro DirectPass 1.5.0.1060 - Multiple Software...
0.2AI Score
0.1AI Score
0.4AI Score
7.1AI Score
0.2AI Score
Redline: Answering Your Questions
Those of you who attended the "Tools of Engagement: Redline™ - We've Got the Tool, If You've Got the Time" webinar last month by David Ross and myself will recall that we ran short on time while answering all of your questions. The webinar covered the latest updates to Redline, Mandiant's free...
-0.2AI Score
Philippines-Malaysia Cyber war over Sabah land dispute
A series of websites defacement has been conducted between Philippines and Malaysia over the dispute in the land of Sabah. Hackers claiming to be part of Anonymous group from Malaysian and Filipino and attacking websites of each other. It was believed that the first online attacks were made by...
6.8AI Score
Philippines-Malaysia Cyber war over Sabah land dispute
A series of websites defacement has been conducted between Philippines and Malaysia over the dispute in the land of Sabah. Hackers claiming to be part of Anonymous group from Malaysian and Filipino and attacking websites of each other. It was believed that the first online attacks were made by...
6.8AI Score
Mandiant revealed Chinese APT1 Cyber Espionage campaign
Few weeks after the discovery of the sophisticated cyber espionage campaign against principal US media The Mandiant® Intelligence Center™ released an shocking report that reveals an enterprise-scale computer espionage campaign dubbed APT1. The term APT1 is referred to one of the numerous cyber...
6.8AI Score
Mandiant revealed Chinese APT1 Cyber Espionage campaign
Few weeks after the discovery of the sophisticated cyber espionage campaign against principal US media The Mandiant® Intelligence Center™ released an shocking report that reveals an enterprise-scale computer espionage campaign dubbed APT1. The term APT1 is referred to one of the numerous cyber...
6.8AI Score
Sonicwall OEM Scrutinizer v9.5.2 - Multiple Vulnerabilities
Title: Sonicwall OEM Scrutinizer v9.5.2 - Multiple Vulnerabilities Date: 2013-02-14 References: http://www.vulnerability-lab.com/get_content.php?id=786 VL-ID: 786 Common Vulnerability Scoring System: 5.2 Introduction: Dell™ SonicWALL™ Scrutinizer is a multi-vendor, flow-based application traffic...
-0.5AI Score
7.4AI Score
AI Score
SonicWALL OEM Scrutinizer 9.5.2 - Multiple Vulnerabilities
SonicWALL OEM Scrutinizer 9.5.2 - Multiple...
0.3AI Score
7.1AI Score
0.2AI Score
First week at MEGA Bounty Program, paid out thousands of dollars for seven Bugs
One week after launching a Bug bounty program by the Kim Dotcom's new file-storage and sharing service MEGA claims to have fixed seven vulnerabilities. Although Mega hasn't shared how much money and to whom it paid out in the first week. But as promised, it is clear that MEGA paid out thousands of....
6.8AI Score
First week at MEGA Bounty Program, paid out thousands of dollars for seven Bugs
One week after launching a Bug bounty program by the Kim Dotcom's new file-storage and sharing service MEGA claims to have fixed seven vulnerabilities. Although Mega hasn't shared how much money and to whom it paid out in the first week. But as promised, it is clear that MEGA paid out thousands of....
6.8AI Score
The capillary diffusion of mobile devices, the lack of security systems on these platforms and low level of awareness on principal cyber threats made them a privileged target for cybercrime. We have assisted in the recent year to an explosion of malware designed to hit principal mobile OSs, in a...
7.1AI Score
The capillary diffusion of mobile devices, the lack of security systems on these platforms and low level of awareness on principal cyber threats made them a privileged target for cybercrime. We have assisted in the recent year to an explosion of malware designed to hit principal mobile OSs, in a...
7.1AI Score
A Look Back at 2012: The Armory
As we are mere hours away from celebrating 2013, we'd like to focus today on M-Unition's Armory channel. The Armory is the place to be if you want to be the first to find out about the latest releases, free tools and of course, our ever popular M-Trends report. The most popular posts in this...
0.3AI Score
Vulnerability in HTC website allow attacker to hijack accounts
Thamatam Deepak (Mr.47™) reported a Cross site scripting (XSS) Vulnerability and cookie handling in HTC website, that allow an attacker to HTC website hijack accounts. Mr. Deepak is a 16 years old whitehat hacker, listed in Apple Hall of Fame with 'The Hacker News' researcher Mohit Kumar this...
6.4AI Score
Vulnerability in HTC website allow attacker to hijack accounts
Thamatam Deepak (Mr.47™) reported a Cross site scripting (XSS) Vulnerability and cookie handling in HTC website, that allow an attacker to HTC website hijack accounts. Mr. Deepak is a 16 years old whitehat hacker, listed in Apple Hall of Fame with 'The Hacker News' researcher Mohit Kumar this...
6.4AI Score
Threat Outbreak Alert: Fake Product Order Email Messages on February 26, 2014
Medium Alert ID: 27710 First Published: 2012 December 21 18:20 GMT Last Updated: 2014 February 27 13:02 GMT Version: 79 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a product order quote for the recipient. The text in the email...
0.6AI Score
SonicWALL SonicOS 5.8.1.8 WAF - Cross-Site Scripting
SonicWALL SonicOS 5.8.1.8 WAF - Cross-Site...
-0.1AI Score
7.4AI Score