Lucene search

K

Books & Papers Security Vulnerabilities

nvd
nvd

CVE-2013-3091

An Authentication Bypass vulnerability in Belkin N300 (F7D7301v1) router allows remote attackers to bypass authentication using "Javascript...

9.8CVSS

9.7AI Score

0.007EPSS

2020-02-07 07:15 PM
cve
cve

CVE-2013-3067

Linksys WRT310Nv2 2.0.0.1 is vulnerable to...

5.4CVSS

5.5AI Score

0.001EPSS

2020-02-07 07:15 PM
85
prion
prion

Authentication flaw

An Authentication Bypass vulnerability in Belkin N300 (F7D7301v1) router allows remote attackers to bypass authentication using "Javascript...

9.8CVSS

7.5AI Score

0.007EPSS

2020-02-07 07:15 PM
3
prion
prion

Cross site scripting

Linksys WRT310Nv2 2.0.0.1 is vulnerable to...

5.4CVSS

7AI Score

0.001EPSS

2020-02-07 07:15 PM
2
prion
prion

Hardcoded credentials

D-Link DIR865L v1.03 suffers from an "Unauthenticated Hardware Linking"...

5.9CVSS

7.1AI Score

0.001EPSS

2020-02-07 07:15 PM
1
cvelist
cvelist

CVE-2013-3096

D-Link DIR865L v1.03 suffers from an "Unauthenticated Hardware Linking"...

5.8AI Score

0.001EPSS

2020-02-07 06:36 PM
cvelist
cvelist

CVE-2013-3067

Linksys WRT310Nv2 2.0.0.1 is vulnerable to...

5.5AI Score

0.001EPSS

2020-02-07 06:24 PM
cvelist
cvelist

CVE-2013-3091

An Authentication Bypass vulnerability in Belkin N300 (F7D7301v1) router allows remote attackers to bypass authentication using "Javascript...

9.7AI Score

0.007EPSS

2020-02-07 06:03 PM
thn
thn

5 High Impact Flaws Affect Cisco Routers, Switches, IP Phones and Cameras

Several Cisco-manufactured network equipments have been found vulnerable to five new security vulnerabilities that could allow hackers to take complete control over them, and subsequently, over the enterprise networks they power. Four of the five high-severity bugs are remote code execution...

8.8CVSS

1.6AI Score

0.009EPSS

2020-02-05 08:46 PM
147
thn
thn

Exfiltrating Data from Air-Gapped Computers Using Screen Brightness

It may sound creepy and unreal, but hackers can also exfiltrate sensitive data from your computer by simply changing the brightness of the screen, new cybersecurity research shared with The Hacker News revealed. In recent years, several cybersecurity researchers demonstrated innovative ways to...

AI Score

2020-02-05 03:42 PM
34
kitploit
kitploit

Nfstream - A Flexible Network Data Analysis Framework

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python....

7.1AI Score

2020-02-04 11:00 AM
55
kitploit
kitploit

PCFG Cracker - Probabilistic Context Free Grammar (PCFG) Password Guess Generator

PCFG = Probabilistic Context Free Grammar PCFG = Pretty Cool Fuzzy Guesser In short: A collection of tools to perform research into how humans generate passwords. These can be used to crack password hashes, but also create synthetic passwords (honeywords), or help develop better password strength.....

6.8AI Score

2020-02-02 08:30 PM
81
schneier
schneier

Smartphone Election in Washington State

This year: King County voters will be able to use their name and birthdate to log in to a Web portal through the Internet browser on their phones, says Bryan Finney, the CEO of Democracy Live, the Seattle-based voting company providing the technology. Once voters have completed their ballots,...

1AI Score

2020-01-27 12:03 PM
29
kitploit
kitploit

Karonte - A Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded Firmware

Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware. Research paper We present our approach and the findings of this work in the following research paper: KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware [PDF] Nilo Redini,...

7.3AI Score

2020-01-11 11:30 AM
113
krebs
krebs

The Hidden Cost of Ransomware: Wholesale Password Theft

Organizations in the throes of cleaning up after a ransomware outbreak typically will change passwords for all user accounts that have access to any email systems, servers and desktop workstations within their network. But all too often, ransomware victims fail to grasp that the crooks behind...

6.9AI Score

2020-01-06 06:17 PM
40
trellix
trellix

We Be Jammin’ – Bypassing Chamberlain myQ Garage Doors

ARCHIVED STORY We Be Jammin’ – Bypassing Chamberlain myQ Garage Doors Sam Quinn · JAN 06, 2020 The idea of controlling your garage door remotely and verifying that everything is secure at home, or having packages delivered directly into your garage is enticing for many people. The convenience that....

-0.1AI Score

2020-01-06 12:00 AM
6
trellix
trellix

We Be Jammin’ – Bypassing Chamberlain myQ Garage Doors

ARCHIVED STORY We Be Jammin’ – Bypassing Chamberlain myQ Garage Doors Sam Quinn · JAN 06, 2020 The idea of controlling your garage door remotely and verifying that everything is secure at home, or having packages delivered directly into your garage is enticing for many people. The convenience that....

7AI Score

2020-01-06 12:00 AM
3
kitploit
kitploit

WindowsFirewallRuleset - Windows Firewall Ruleset Powershell Scripts

About WindowsFirewallRuleset Windows firewall rulles organized into individual powershell scripts according to: Rule group Traffic direction IP version (IPv4 / IPv6) Further sorted according to programs and services such as for example: ICMP traffic Browser rules rules for Windows system Store...

7.5AI Score

2020-01-04 09:00 PM
150
kitploit
kitploit

AVCLASS++ - Yet Another Massive Malware Labeling Tool

AVCLASS++ is an appealing complement to AVCLASS [1], a state-of-the-art malware labeling tool. Overview AVCLASS++ is a labeling tool for creating a malware dataset. Addressing malware threats requires constant efforts to create and maintain a dataset. Especially, labeling malware samples is a...

6.8AI Score

2020-01-02 11:30 AM
108
threatpost
threatpost

Mean Time to Hardening: The Next-Gen Security Metric

On average, it takes an organization 15 times longer to close a vulnerability than it does for attackers to weaponize and exploit one. Seven days to weaponize and 102 days to patch. Let that sink in. Once a vulnerability is disclosed, it’s you against them in a race to either secure or exploit;...

-0.4AI Score

2019-12-30 02:00 PM
103
cve
cve

CVE-2013-3088

Belkin N900 router (F9K1104v1) contains an Authentication Bypass using "Javascript...

9.8CVSS

9.4AI Score

0.003EPSS

2019-12-26 11:15 PM
59
cve
cve

CVE-2013-3085

An authentication bypass exists in the web management interface in Belkin F5D8236-4...

9.8CVSS

9.5AI Score

0.007EPSS

2019-12-26 11:15 PM
58
nvd
nvd

CVE-2013-3088

Belkin N900 router (F9K1104v1) contains an Authentication Bypass using "Javascript...

9.8CVSS

9.6AI Score

0.003EPSS

2019-12-26 11:15 PM
nvd
nvd

CVE-2013-3085

An authentication bypass exists in the web management interface in Belkin F5D8236-4...

9.8CVSS

9.7AI Score

0.007EPSS

2019-12-26 11:15 PM
1
prion
prion

Authentication flaw

An authentication bypass exists in the web management interface in Belkin F5D8236-4...

9.8CVSS

7.4AI Score

0.007EPSS

2019-12-26 11:15 PM
4
prion
prion

Authentication flaw

Belkin N900 router (F9K1104v1) contains an Authentication Bypass using "Javascript...

9.8CVSS

7.2AI Score

0.003EPSS

2019-12-26 11:15 PM
2
cvelist
cvelist

CVE-2013-3088

Belkin N900 router (F9K1104v1) contains an Authentication Bypass using "Javascript...

9.6AI Score

0.003EPSS

2019-12-26 10:46 PM
cvelist
cvelist

CVE-2013-3085

An authentication bypass exists in the web management interface in Belkin F5D8236-4...

9.8AI Score

0.007EPSS

2019-12-26 10:41 PM
1
cve
cve

CVE-2019-6008

An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ?...

7.8CVSS

7.9AI Score

0.001EPSS

2019-12-26 04:15 PM
26
nvd
nvd

CVE-2019-6008

An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ?...

7.8CVSS

8AI Score

0.001EPSS

2019-12-26 04:15 PM
1
prion
prion

Design/Logic Flaw

An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ?...

7.8CVSS

7.9AI Score

0.001EPSS

2019-12-26 04:15 PM
5
cvelist
cvelist

CVE-2019-6008

An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ?...

8AI Score

0.001EPSS

2019-12-26 03:16 PM
talosblog
talosblog

Threat Source newsletter (Dec. 19, 2019)

Newsletter compiled by Jon Munshaw. Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week. We have an early holiday present for you! This week, we introduced a new podcast to the Talos family. Talos Takes, a new short-form...

6.6AI Score

EPSS

2019-12-19 11:00 AM
34
impervablog
impervablog

Cloud Transformation – 2020 Trend #1

The Imperva team is closing out 2019 with a series on the cybersecurity trends we predict will shape the landscape in 2020. Last week, Imperva CTO Kunal Anand mined insights from our global customer base and our research team, Imperva Research Labs, to come up with his top five list of...

-0.2AI Score

2019-12-17 06:23 PM
25
krebs
krebs

Ransomware Gangs Now Outing Victim Businesses That Don’t Pay Up

As if the scourge of ransomware wasn't bad enough already: Several prominent purveyors of ransomware have signaled they plan to start publishing data stolen from victims who refuse to pay up. To make matters worse, one ransomware gang has now created a public Web site identifying recent victim...

6.6AI Score

2019-12-17 02:21 AM
41
mssecure
mssecure

Finding a common language to describe AI security threats

As artificial intelligence (AI) and machine learning systems become increasingly important to our lives, it’s critical that when they fail we understand how and why. Many research papers have been dedicated to this topic, but inconsistent vocabulary has limited their usefulness. In collaboration...

1.6AI Score

2019-12-13 05:00 PM
37
impervablog
impervablog

Top 5 Cybersecurity Trends to Prepare for in 2020

I don’t need a crystal ball to predict that in 2020 cybersecurity attacks will accelerate and the tactics will evolve. We’ll continue to be hounded by greater volumes of the attacks that have threatened us for years and, as businesses adopt new innovations, new vulnerabilities to threats will...

-0.2AI Score

2019-12-11 07:04 PM
30
schneier
schneier

Failure Modes in Machine Learning

Interesting taxonomy of machine-learning failures (pdf) that encompasses both mistakes and attacks, or -- in their words -- intentional and unintentional failure modes. It's a good basis for threat...

2.7AI Score

2019-12-09 11:56 AM
38
securelist
securelist

Spam and phishing in Q3 2019

Quarterly highlights Amazon Prime In Q3, we registered numerous scam mailings related to Amazon Prime. Most of the phishing emails with a link to a fake Amazon login page offered new prices or rewards for buying things, or reported problems with membership, etc. Against the backdrop of September's....

-0.6AI Score

0.974EPSS

2019-11-26 10:00 AM
132
malwarebytes
malwarebytes

‘Data as property’ promises fix for privacy problems, but could deepen inequality

In mid-November, Democratic presidential hopeful Andrew Yang unveiled a four-prong policy approach to solving some of today’s thornier tech issues, such as widespread misinformation, technology dependence, and data privacy. Americans, Yang proposed, should receive certain, guaranteed protections...

-0.2AI Score

2019-11-25 04:00 PM
26
krebs
krebs

110 Nursing Homes Cut Off from Health Records in Ransomware Attack

A ransomware outbreak has besieged a Wisconsin based IT company that provides cloud data hosting, security and access management to more than 100 nursing homes across the United States. The ongoing attack is preventing these care centers from accessing crucial patient medical records, and the IT...

7AI Score

2019-11-23 05:02 AM
56
carbonblack
carbonblack

Threat Analysis Unit (TAU) Threat Intelligence Notification: Ramnit Banking Trojan

Ramnit Banking Trojan was first discovered in 2010 and is still evolving and staying actively as the second rank on the top banking trojan list in October 2019 as from the source post. It may be distributing via malvertising, exploit kit, spear-phishing campaign or others method to infect on the...

0.7AI Score

2019-11-18 05:14 PM
67
cve
cve

CVE-2013-3072

An Authentication Bypass vulnerability exists in NETGEAR Centria WNDR4700 Firmware 1.0.0.34 in http:///apply.cgi?/hdd_usr_setup.htm that when visited by any user, authenticated or not, causes the router to no longer require a password to access the web administration...

9.8CVSS

9.2AI Score

0.004EPSS

2019-11-14 07:15 PM
20
nvd
nvd

CVE-2013-3072

An Authentication Bypass vulnerability exists in NETGEAR Centria WNDR4700 Firmware 1.0.0.34 in http:///apply.cgi?/hdd_usr_setup.htm that when visited by any user, authenticated or not, causes the router to no longer require a password to access the web administration...

9.8CVSS

9.4AI Score

0.004EPSS

2019-11-14 07:15 PM
1
prion
prion

Authentication flaw

An Authentication Bypass vulnerability exists in NETGEAR Centria WNDR4700 Firmware 1.0.0.34 in http:///apply.cgi?/hdd_usr_setup.htm that when visited by any user, authenticated or not, causes the router to no longer require a password to access the web administration...

9.8CVSS

7.1AI Score

0.004EPSS

2019-11-14 07:15 PM
2
cvelist
cvelist

CVE-2013-3072

An Authentication Bypass vulnerability exists in NETGEAR Centria WNDR4700 Firmware 1.0.0.34 in http:///apply.cgi?/hdd_usr_setup.htm that when visited by any user, authenticated or not, causes the router to no longer require a password to access the web administration...

9.5AI Score

0.004EPSS

2019-11-14 06:11 PM
1
nvd
nvd

CVE-2013-3516

NETGEAR WNR3500U and WNR3500L routers uses form tokens abased solely on router's current date and time, which allows attackers to guess the CSRF...

6.5CVSS

6.5AI Score

0.002EPSS

2019-11-13 08:15 PM
1
cve
cve

CVE-2013-3516

NETGEAR WNR3500U and WNR3500L routers uses form tokens abased solely on router's current date and time, which allows attackers to guess the CSRF...

6.5CVSS

6.5AI Score

0.002EPSS

2019-11-13 08:15 PM
17
prion
prion

Cross site request forgery (csrf)

NETGEAR WNR3500U and WNR3500L routers uses form tokens abased solely on router's current date and time, which allows attackers to guess the CSRF...

6.5CVSS

7.1AI Score

0.002EPSS

2019-11-13 08:15 PM
2
cvelist
cvelist

CVE-2013-3516

NETGEAR WNR3500U and WNR3500L routers uses form tokens abased solely on router's current date and time, which allows attackers to guess the CSRF...

6.5AI Score

0.002EPSS

2019-11-13 07:30 PM
Total number of security vulnerabilities3170