Lucene search

K

BD Pyxis™ MedBank Security Vulnerabilities

zdt
zdt

HylaFAX+ 5.2.4 - 5.5.3 - Buffer Overflow Vulnerability

Exploit for linux platform in category dos /...

-0.2AI Score

EPSS

2013-10-02 12:00 AM
27
exploitdb

6.5AI Score

EPSS

2013-10-02 12:00 AM
29
securityvulns
securityvulns

CVE-2130-5680, HylaFAX+ heap overflow, unchecked network traffic.

Details Application: "HylaFAX+" Version: 5.2.4 (April, 2008) through 5.5.3 (August 6, 2013) Type: Daemon that manages a fax server via an FTP-like protocol. Vendor / Maintainer: Lee Howard (faxguy at howardsilvan.com) Project Homepage: http://hylafax.sourceforge.net/ Vulnerability: CWE-120:...

0.1AI Score

EPSS

2013-10-01 12:00 AM
11
tibco
tibco

TIBCO Security Advisory: September 25, 2013 - TIBCOActiveMatrixBusinessWorks™

TIBCO ActiveMatrix BusinessWorks™ vulnerability Original release date: Sep 25, 2013 Lastrevised: -- CVE-2012-0687 Source: TIBCO SoftwareInc. TIBCO ActiveMatrix vulnerability Original release date: Sep 25, 2013 Last revised: -- Source: TIBCO Software Inc. Systems Affected TIBCO ActiveMatrix...

6.6AI Score

0.003EPSS

2013-09-25 11:00 PM
3
myhack58
myhack58

About SSV-ID: 4 4 7 4 POC analysis and reflection-vulnerability warning-the black bar safety net

SSV-ID: 4 4 7 4 SSV-AppDir: Discuz! Vulnerability Published: 2008-11-21 (GMT+0 8 0 0) URL: http://sebug.net/vuldb/ssvid-4474 A very old vulnerability, just as the study of penetration of a material of the bale, with its poc, the direct can be used, it feel so magical at the same time want to...

-0.3AI Score

2013-08-29 12:00 AM
28
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Incoming Money Transfer Notification Email Messages on March 23, 2015

Medium Alert ID: 30193 First Published: 2013 July 23 19:02 GMT Last Updated: 2015 March 24 13:27 GMT Version: 20 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain an incoming money transfer notification for the recipient. The text...

-0.1AI Score

2013-07-23 07:02 PM
10
myhack58
myhack58

6 0 degrees™ CMS 1.0 background the COOKIE trick and back directly GETWEBSHELL-vulnerability warning-the black bar safety net

6 0 degrees™ CMS official administrator of a dick. To submit a TICK to. Contact the author, and. The authors confirm, and then TICK the inside ignored. Be a dick and post it out Official download address:http://60du.net/index.html The core file is: administrator directory under check. asp | 1 2 3.....

1AI Score

2013-07-20 12:00 AM
10
securityvulns
securityvulns

Trend Micro DirectPass 1.5.0.1060 - Multiple Vulnerabilities

Title: Trend Micro DirectPass 1.5.0.1060 - Multiple Vulnerabilities Date: 2013-05-21 References: http://www.vulnerability-lab.com/get_content.php?id=894 Article: http://www.vulnerability-lab.com/dev/?p=580 Trend Micro (Reference): http://esupport.trendmicro.com/solution/en-US/1096805.aspx Trend...

AI Score

2013-07-17 12:00 AM
45
thn
thn

Microsoft handed over encrypted messages key and Skype calls access to NSA

New top secret documents provided by Edward Snowden exposed that Microsoft worked hand-in-hand with the United States government and handed the NSA access to encrypted messages and built a series of backdoors into Outlook.com, Skype, and SkyDrive to ease difficulties in accessing online...

6.5AI Score

2013-07-11 09:13 PM
4
thn
thn

Microsoft handed over encrypted messages key and Skype calls access to NSA

New top secret documents provided by Edward Snowden exposed that Microsoft worked hand-in-hand with the United States government and handed the NSA access to encrypted messages and built a series of backdoors into Outlook.com, Skype, and SkyDrive to ease difficulties in accessing online...

6.5AI Score

2013-07-11 10:13 AM
9
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Bank Payment Notification Email Messages on April 4, 2014

Low Alert ID: 29815 First Published: 2013 June 27 13:34 GMT Last Updated: 2014 April 7 11:33 GMT Version: 78 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a bank payment transfer notification for the recipient. The text in the...

0.5AI Score

2013-06-27 01:34 PM
46
thn
thn

Cracking iPhone Hotspot password in 50 Seconds

The ability to turn your iPhone into a Wi-Fi hotspot is a fantastically useful little tool in and of itself. When setting up a personal hotspot on their iPad or iPhone, users have the option of allowing iOS to automatically generate a password. According to a new study by Researchers at the...

6.7AI Score

2013-06-20 03:30 PM
5
thn
thn

LinkedIn was not Hacked, suffered outage due to DNS issue

The LinkedIn became inaccessible for an hour last night. Few Hours before App.net co-founder Bryan Berg posted that LinkedIn DNS was hijacked but later LinkedIn confirmed that they suffered outage due to DNS issue, not Hack. DNS Hijacking is an unauthorized modification of a DNS server or change...

6.9AI Score

2013-06-20 09:38 AM
7
thn
thn

Cracking iPhone Hotspot password in 50 Seconds

The ability to turn your iPhone into a Wi-Fi hotspot is a fantastically useful little tool in and of itself. When setting up a personal hotspot on their iPad or iPhone, users have the option of allowing iOS to automatically generate a password. According to a new study by Researchers at the...

6.7AI Score

2013-06-20 04:30 AM
12
thn
thn

LinkedIn was not Hacked, suffered outage due to DNS issue

The LinkedIn became inaccessible for an hour last night. Few Hours before App.net co-founder Bryan Berg posted that LinkedIn DNS was hijacked but later LinkedIn confirmed that they suffered outage due to DNS issue, not Hack. DNS Hijacking is an unauthorized modification of a DNS server or change...

6.9AI Score

2013-06-19 10:38 PM
10
thn
thn

BlackBerry Z10 Privilege Escalation Vulnerability

BlackBerry Z10 users should be aware that there is a privilege escalation vulnerability. The vulnerability potentially allows a hacker to modify or edit data on a stolen BlackBerry Z10 smartphone with BlackBerry Protect enabled, identified as BSRT-2013-006 (CVE-2013-3692) According to the...

7.3AI Score

0.019EPSS

2013-06-18 05:47 PM
12
thn
thn

BlackBerry Z10 Privilege Escalation Vulnerability

BlackBerry Z10 users should be aware that there is a privilege escalation vulnerability. The vulnerability potentially allows a hacker to modify or edit data on a stolen BlackBerry Z10 smartphone with BlackBerry Protect enabled, identified as BSRT-2013-006 (CVE-2013-3692) According to the...

6.8AI Score

0.019EPSS

2013-06-18 06:47 AM
21
thn
thn

Anonymous Hacker outs wanted Edmonton men for child exploitation

A YouTube video posted by a group calling themselves Anonymous is getting a lot of attention online, claims to have outed two men who allegedly tried to lure underaged girls over the internet. In a video posted on Friday, a member of Anonymous describes a sting operation in which two Edmonton-area....

6.6AI Score

2013-06-11 05:02 PM
3
thn
thn

New ZeuS Malware spreading automatically via USB Flash Drives

The notorious Zeus Trojan, a family of banking malware known for stealing passwords and draining the accounts of its victims, has steadily increased in recent months. The malware family itself is frequently updated with mechanisms designed to evade detection by antivirus and network security...

6.7AI Score

2013-06-11 02:59 PM
9
thn
thn

Anonymous Hacker outs wanted Edmonton men for child exploitation

A YouTube video posted by a group calling themselves Anonymous is getting a lot of attention online, claims to have outed two men who allegedly tried to lure underaged girls over the internet. In a video posted on Friday, a member of Anonymous describes a sting operation in which two Edmonton-area....

6.6AI Score

2013-06-11 06:02 AM
18
thn
thn

New ZeuS Malware spreading automatically via USB Flash Drives

The notorious Zeus Trojan, a family of banking malware known for stealing passwords and draining the accounts of its victims, has steadily increased in recent months. The malware family itself is frequently updated with mechanisms designed to evade detection by antivirus and network security...

6.7AI Score

2013-06-11 03:59 AM
10
thn
thn

Edward Snowden, whistleblower behind the NSA surveillance Program leak

The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. He's a high school dropout who worked his way into the most secretive....

6.5AI Score

2013-06-10 11:51 AM
2
thn
thn

Edward Snowden, whistleblower behind the NSA surveillance Program leak

The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. He's a high school dropout who worked his way into the most secretive....

6.5AI Score

2013-06-10 12:51 AM
8
exploitpack
exploitpack

Trend Micro DirectPass 1.5.0.1060 - Multiple Software Vulnerabilities

Trend Micro DirectPass 1.5.0.1060 - Multiple Software...

0.2AI Score

2013-05-26 12:00 AM
20
packetstorm

0.1AI Score

2013-05-23 12:00 AM
18
vulnerlab

7.1AI Score

2013-05-20 12:00 AM
25
vulnerlab

0.2AI Score

2013-05-20 12:00 AM
4
fireeye
fireeye

Redline: Answering Your Questions

Those of you who attended the "Tools of Engagement: Redline™ - We've Got the Tool, If You've Got the Time" webinar last month by David Ross and myself will recall that we ran short on time while answering all of your questions. The webinar covered the latest updates to Redline, Mandiant's free...

-0.2AI Score

2013-03-04 06:05 PM
45
thn
thn

Philippines-Malaysia Cyber war over Sabah land dispute

A series of websites defacement has been conducted between Philippines and Malaysia over the dispute in the land of Sabah. Hackers claiming to be part of Anonymous group from Malaysian and Filipino and attacking websites of each other. It was believed that the first online attacks were made by...

6.8AI Score

2013-03-04 11:08 AM
5
thn
thn

Philippines-Malaysia Cyber war over Sabah land dispute

A series of websites defacement has been conducted between Philippines and Malaysia over the dispute in the land of Sabah. Hackers claiming to be part of Anonymous group from Malaysian and Filipino and attacking websites of each other. It was believed that the first online attacks were made by...

6.8AI Score

2013-03-04 12:08 AM
12
thn
thn

Mandiant revealed Chinese APT1 Cyber Espionage campaign

Few weeks after the discovery of the sophisticated cyber espionage campaign against principal US media The Mandiant® Intelligence Center™ released an shocking report that reveals an enterprise-scale computer espionage campaign dubbed APT1. The term APT1 is referred to one of the numerous cyber...

6.8AI Score

2013-02-19 03:17 PM
9
thn
thn

Mandiant revealed Chinese APT1 Cyber Espionage campaign

Few weeks after the discovery of the sophisticated cyber espionage campaign against principal US media The Mandiant® Intelligence Center™ released an shocking report that reveals an enterprise-scale computer espionage campaign dubbed APT1. The term APT1 is referred to one of the numerous cyber...

6.8AI Score

2013-02-19 04:17 AM
18
securityvulns
securityvulns

Sonicwall OEM Scrutinizer v9.5.2 - Multiple Vulnerabilities

Title: Sonicwall OEM Scrutinizer v9.5.2 - Multiple Vulnerabilities Date: 2013-02-14 References: http://www.vulnerability-lab.com/get_content.php?id=786 VL-ID: 786 Common Vulnerability Scoring System: 5.2 Introduction: Dell™ SonicWALL™ Scrutinizer is a multi-vendor, flow-based application traffic...

-0.5AI Score

2013-02-18 12:00 AM
25
exploitdb

7.4AI Score

2013-02-14 12:00 AM
29
packetstorm

AI Score

2013-02-14 12:00 AM
34
exploitpack
exploitpack

SonicWALL OEM Scrutinizer 9.5.2 - Multiple Vulnerabilities

SonicWALL OEM Scrutinizer 9.5.2 - Multiple...

0.3AI Score

2013-02-14 12:00 AM
22
vulnerlab

7.1AI Score

2013-02-13 12:00 AM
28
vulnerlab

0.2AI Score

2013-02-13 12:00 AM
5
thn
thn

First week at MEGA Bounty Program, paid out thousands of dollars for seven Bugs

One week after launching a Bug bounty program by the Kim Dotcom's new file-storage and sharing service MEGA claims to have fixed seven vulnerabilities. Although Mega hasn't shared how much money and to whom it paid out in the first week. But as promised, it is clear that MEGA paid out thousands of....

6.8AI Score

2013-02-11 06:37 PM
3
thn
thn

First week at MEGA Bounty Program, paid out thousands of dollars for seven Bugs

One week after launching a Bug bounty program by the Kim Dotcom's new file-storage and sharing service MEGA claims to have fixed seven vulnerabilities. Although Mega hasn't shared how much money and to whom it paid out in the first week. But as promised, it is clear that MEGA paid out thousands of....

6.8AI Score

2013-02-11 07:37 AM
9
thn
thn

Dissecting a mobile malware

The capillary diffusion of mobile devices, the lack of security systems on these platforms and low level of awareness on principal cyber threats made them a privileged target for cybercrime. We have assisted in the recent year to an explosion of malware designed to hit principal mobile OSs, in a...

7.1AI Score

2013-01-27 01:12 PM
5
thn
thn

Dissecting a mobile malware

The capillary diffusion of mobile devices, the lack of security systems on these platforms and low level of awareness on principal cyber threats made them a privileged target for cybercrime. We have assisted in the recent year to an explosion of malware designed to hit principal mobile OSs, in a...

7.1AI Score

2013-01-27 02:12 AM
14
fireeye
fireeye

A Look Back at 2012: The Armory

As we are mere hours away from celebrating 2013, we'd like to focus today on M-Unition's Armory channel. The Armory is the place to be if you want to be the first to find out about the latest releases, free tools and of course, our ever popular M-Trends report. The most popular posts in this...

0.3AI Score

2012-12-31 04:06 PM
15
thn
thn

Vulnerability in HTC website allow attacker to hijack accounts

Thamatam Deepak (Mr.47™) reported a Cross site scripting (XSS) Vulnerability and cookie handling in HTC website, that allow an attacker to HTC website hijack accounts. Mr. Deepak is a 16 years old whitehat hacker, listed in Apple Hall of Fame with 'The Hacker News' researcher Mohit Kumar this...

6.4AI Score

2012-12-28 12:45 PM
5
thn
thn

Vulnerability in HTC website allow attacker to hijack accounts

Thamatam Deepak (Mr.47™) reported a Cross site scripting (XSS) Vulnerability and cookie handling in HTC website, that allow an attacker to HTC website hijack accounts. Mr. Deepak is a 16 years old whitehat hacker, listed in Apple Hall of Fame with 'The Hacker News' researcher Mohit Kumar this...

6.4AI Score

2012-12-28 01:45 AM
10
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Product Order Email Messages on February 26, 2014

Medium Alert ID: 27710 First Published: 2012 December 21 18:20 GMT Last Updated: 2014 February 27 13:02 GMT Version: 79 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a product order quote for the recipient. The text in the email...

0.6AI Score

2012-12-21 06:20 PM
22
exploitpack
exploitpack

SonicWALL SonicOS 5.8.1.8 WAF - Cross-Site Scripting

SonicWALL SonicOS 5.8.1.8 WAF - Cross-Site...

-0.1AI Score

2012-12-19 12:00 AM
21
exploitdb

7.4AI Score

2012-12-19 12:00 AM
35
Total number of security vulnerabilities7916