Lucene search

K

Softomi Gelişmiş C2C Pazaryeri Yazılımı Security Vulnerabilities

nvd
nvd

CVE-2023-6122

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in İstanbul Soft Informatics and Consultancy Limited Company Softomi Gelişmiş C2C Pazaryeri Yazılımı allows Reflected XSS.This issue affects Softomi Gelişmiş C2C Pazaryeri Yazılımı: before...

6.1CVSS

0.0005EPSS

2023-12-21 02:15 PM
nvd
nvd

CVE-2023-6145

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in İstanbul Soft Informatics and Consultancy Limited Company Softomi Advanced C2C Marketplace Software allows SQL Injection.This issue affects Softomi Advanced C2C Marketplace Software: before...

9.8CVSS

0.001EPSS

2023-12-21 02:15 PM
cve
cve

CVE-2023-6122

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in İstanbul Soft Informatics and Consultancy Limited Company Softomi Gelişmiş C2C Pazaryeri Yazılımı allows Reflected XSS.This issue affects Softomi Gelişmiş C2C Pazaryeri Yazılımı: before...

6.1CVSS

6.3AI Score

0.0005EPSS

2023-12-21 02:15 PM
8
cve
cve

CVE-2023-6145

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in İstanbul Soft Informatics and Consultancy Limited Company Softomi Advanced C2C Marketplace Software allows SQL Injection.This issue affects Softomi Advanced C2C Marketplace Software: before...

9.8CVSS

9.7AI Score

0.001EPSS

2023-12-21 02:15 PM
13
prion
prion

Sql injection

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Istanbul Soft Informatics and Consultancy Limited Company Softomi Advanced C2C Marketplace Software allows SQL Injection.This issue affects Softomi Advanced C2C Marketplace Software: before...

9.8CVSS

9.7AI Score

0.001EPSS

2023-12-21 02:15 PM
11
prion
prion

Cross site scripting

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Istanbul Soft Informatics and Consultancy Limited Company Softomi Gelismis C2C Pazaryeri Yazilimi allows Reflected XSS.This issue affects Softomi Gelismis C2C Pazaryeri Yazilimi: before...

6.1CVSS

6.3AI Score

0.0005EPSS

2023-12-21 02:15 PM
4
cvelist
cvelist

CVE-2023-6145 SQLi in Softomi E-commerce Software

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in İstanbul Soft Informatics and Consultancy Limited Company Softomi Advanced C2C Marketplace Software allows SQL Injection.This issue affects Softomi Advanced C2C Marketplace Software: before...

9.8CVSS

10AI Score

0.001EPSS

2023-12-21 01:58 PM
cvelist
cvelist

CVE-2023-6122 Reflected XSS in Softomi E-commerce Software

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in İstanbul Soft Informatics and Consultancy Limited Company Softomi Gelişmiş C2C Pazaryeri Yazılımı allows Reflected XSS.This issue affects Softomi Gelişmiş C2C Pazaryeri Yazılımı: before...

6.1CVSS

6.5AI Score

0.0005EPSS

2023-12-21 01:53 PM
trellix
trellix

Storm-0324: An access for the RaaS Threat Actor (Sangria Tempest)

Storm-0324 to Sangria Tempest Leads to Ransomware Capabilities By Gurumoorthi Ramanathan · October 5, 2023 Executive Summary: In early July 2023, the threat actor that Microsoft calls “Storm-0324” was observed sending a phishing message through Microsoft Teams. Storm-0324 is a financially...

8.3AI Score

0.002EPSS

2023-10-05 12:00 AM
6
trellix
trellix

Storm-0324: An access for the RaaS Threat Actor (Sangria Tempest)

Storm-0324 to Sangria Tempest Leads to Ransomware Capabilities By Gurumoorthi Ramanathan · October 5, 2023 Executive Summary: In early July 2023, the threat actor that Microsoft calls “Storm-0324” was observed sending a phishing message through Microsoft Teams. Storm-0324 is a financially...

8.2AI Score

0.002EPSS

2023-10-05 12:00 AM
22
packetstorm

0.1AI Score

2023-01-18 12:00 AM
171
packetstorm

-0.2AI Score

2023-01-17 12:00 AM
133
mssecure
mssecure

Microsoft supports the DoD’s Zero Trust strategy

The Department of Defense (DoD) released its formal Zero Trust strategy today, marking a major milestone in its goal of achieving enterprise-wide implementation by 2027. The strategy comes at a critical time as United States government networks continue to face nearly half the global nation-state.....

-0.5AI Score

2022-11-22 08:40 PM
14
mmpc
mmpc

Microsoft supports the DoD’s Zero Trust strategy

The Department of Defense (DoD) released its formal Zero Trust strategy today, marking a major milestone in its goal of achieving enterprise-wide implementation by 2027. The strategy comes at a critical time as United States government networks continue to face nearly half the global nation-state.....

-0.5AI Score

2022-11-22 08:40 PM
18
thn
thn

Amadey Bot Spotted Deploying LockBit 3.0 Ransomware on Hacked Machines

The Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems, researchers have warned. "Amadey bot, the malware that is used to install LockBit, is being distributed through two methods: one using a malicious Word document file, and the other using an executable that...

0.5AI Score

2022-11-08 02:52 PM
53
oraclelinux
oraclelinux

Unbreakable Enterprise kernel-container security update

[5.15.0-2.52.3.el8] - posix-cpu-timers: Cleanup CPU timers before freeing them during exec (Thadeu Lima de Souza Cascardo) [Orabug: 34495548] {CVE-2022-2585} - fix race between exit_itimers() and /proc/pid/timers (Oleg Nesterov) [Orabug: 34495548] - rds: ib: Add preemption control when using...

7.8CVSS

-0.3AI Score

EPSS

2022-09-21 12:00 AM
31
oraclelinux
oraclelinux

Unbreakable Enterprise kernel security update

[5.15.0-2.52.3] - posix-cpu-timers: Cleanup CPU timers before freeing them during exec (Thadeu Lima de Souza Cascardo) [Orabug: 34495548] {CVE-2022-2585} - fix race between exit_itimers() and /proc/pid/timers (Oleg Nesterov) [Orabug: 34495548] - rds: ib: Add preemption control when using...

7.8CVSS

-0.3AI Score

EPSS

2022-09-21 12:00 AM
22
oraclelinux
oraclelinux

Unbreakable Enterprise kernel-container security update

r[ 5.4.17-2136.310.7] - net_sched: cls_route: remove from list when handle is 0 (Thadeu Lima de Souza Cascardo) [Orabug: 34480880] {CVE-2022-2588} - x86/spec_ctrl: limit IBRS_FW to retpoline only (Ankur Arora) [Orabug: 34450896] - x86/bugs: display dynamic retbleed state (Ankur Arora) ...

6.5CVSS

0.1AI Score

EPSS

2022-08-15 12:00 AM
23
oraclelinux
oraclelinux

Unbreakable Enterprise kernel security update

[5.4.17-2136.310.7] - net_sched: cls_route: remove from list when handle is 0 (Thadeu Lima de Souza Cascardo) [Orabug: 34480880] {CVE-2022-2588} - x86/spec_ctrl: limit IBRS_FW to retpoline only (Ankur Arora) [Orabug: 34450896] - x86/bugs: display dynamic retbleed state (Ankur Arora) [Orabug:...

6.5CVSS

0.1AI Score

EPSS

2022-08-15 12:00 AM
36
oraclelinux
oraclelinux

Unbreakable Enterprise kernel security update

[4.14.35-2047.516.1.1] - net_sched: cls_route: remove from list when handle is 0 (Thadeu Lima de Souza Cascardo) [Orabug: 34460938] {CVE-2022-2588} [4.14.35-2047.516.1] - KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (Vitaly Kuznetsov) [Orabug:...

-0.1AI Score

0.001EPSS

2022-08-09 12:00 AM
32
oraclelinux
oraclelinux

Unbreakable Enterprise kernel-container security update

[4.14.35-2047.516.1.1] - net_sched: cls_route: remove from list when handle is 0 (Thadeu Lima de Souza Cascardo) [Orabug: 34460938] {CVE-2022-2588} [4.14.35-2047.516.1] - KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (Vitaly Kuznetsov) [Orabug:...

-0.1AI Score

0.001EPSS

2022-08-09 12:00 AM
27
qualysblog
qualysblog

Catching the RAT called Agent Tesla

For the last few years, the Qualys Research Team has been observing an infamous "Malware-as-a-service" RAT (Remote Access Trojan) called Agent Tesla. It first appeared in 2014, and since then many variants have been deployed. This malware uses multiple techniques for evading detection as well as...

0.1AI Score

2022-02-03 07:22 AM
27
threatpost
threatpost

Relentless Log4j Attacks Include State Actors, Possible Worm

Call it a “logjam” of threats: Attackers including nation-state actors have already targeted half of all corporate global networks in security companies’ telemetry using at least 70 distinct malware families — and the fallout from the Log4j vulnerability is just beginning. Researchers manning...

10CVSS

-0.6AI Score

0.976EPSS

2021-12-15 11:18 PM
103
kitploit
kitploit

pFuzz - Helps Us To Bypass Web Application Firewall By Using Different Methods At The Same Time

pFuzz is an advanced red teaming fuzzing tool which we developed for our research. It helps us to bypass web application firewall by using different methods at the same time. pFuzz web uygulama araştırmaları için geliştirdiğimiz, gelişmiş bir fuzzing aracıdır. Farklı güvenlik uygulamaları üzerinde....

7.3AI Score

2021-10-05 08:30 PM
26
thn
thn

MSPs and MSSPs Can Increase Profit Margins With Cynet 360 Platform

As cyber threats keep on increasing in volume and sophistication, more and more organizations acknowledge that outsourcing their security operations to a 3rd-party service provider is a practice that makes the most sense. To address this demand, managed security services providers (MSSPs) and...

AI Score

2021-08-11 11:33 AM
59
akamaiblog
akamaiblog

How Enigmo Moved Logic from Client to Origin to Edge

By: Hideki Ito Enigmo owns BUYMA, a Japanese fashion C2C marketplace that helps people buy and sell high-quality goods from overseas on www.buyma.com. BUYMA has 8.21 million members and deals with 5.62 million items across 140,000 fashion brands. Its website uses EdgeWorkers to manipulate cookies,....

7.4AI Score

2021-06-01 02:00 PM
36
akamaiblog
akamaiblog

How Enigmo Moved Logic from Client to Origin to Edge

Enigmo owns BUYMA, a Japanese fashion C2C marketplace that helps people buy and sell high-quality goods from overseas on...

7AI Score

2021-06-01 04:00 AM
8
kitploit
kitploit

DNS-Black-Cat(DBC) - Multi Platform Toolkit For An Interactive DNS Shell Commands Exfiltration, By Using DNS-Cat You Will Be Able To Execute System Commands In Shell Mode Over DNS Protocol

Multi-platform toolkit for an interactive C2C DNS shell, by using DNS-Black-Cat, you will be able to execute system commands in shell mode over a fully encrypted covert channel. Server ported as a python script, which acts as DNS server with required functionalities to provide interactive shell...

7.8AI Score

2021-05-26 09:30 PM
70
exploitdb

7.3AI Score

2020-07-02 12:00 AM
1096
trellix
trellix

Ransomware Maze

ARCHIVED STORY Ransomware Maze Alexandre Mundo · MAR 26, 2020 Overview The Maze ransomware, previously known in the community as “ChaCha ransomware”, was discovered on May the 29th 2019 by Jerome Segura[1]. The main goal of the ransomware is to crypt all files that it can in an infected system and....

6.8AI Score

2020-03-26 12:00 AM
5
trellix
trellix

Ransomware Maze

ARCHIVED STORY Ransomware Maze Alexandre Mundo · MAR 26, 2020 Overview The Maze ransomware, previously known in the community as “ChaCha ransomware”, was discovered on May the 29th 2019 by Jerome Segura[1]. The main goal of the ransomware is to crypt all files that it can in an infected system and....

0.1AI Score

2020-03-26 12:00 AM
3
trellix
trellix

Ransomware Maze

ARCHIVED STORY Ransomware Maze Alexandre Mundo · MAR 26, 2020 Overview The Maze ransomware, previously known in the community as “ChaCha ransomware”, was discovered on May the 29th 2019 by Jerome Segura[1]. The main goal of the ransomware is to crypt all files that it can in an infected system and....

0.1AI Score

2020-03-26 12:00 AM
8
trellix
trellix

Ransomware Maze

ARCHIVED STORY Ransomware Maze Alexandre Mundo · MAR 26, 2020 Overview The Maze ransomware, previously known in the community as “ChaCha ransomware”, was discovered on May the 29th 2019 by Jerome Segura[1]. The main goal of the ransomware is to crypt all files that it can in an infected system and....

6.8AI Score

2020-03-26 12:00 AM
2
oraclelinux
oraclelinux

kernel security, bug fix, and enhancement update

[4.18.0-147.OL8] - Oracle Linux certificates (Alexey Petrenko) - Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237] - Update x509.genkey [Orabug: 24817676] [4.18.0-147] - [x86] perf/x86/intel: Fix spurious NMI on fixed counter....

9.8CVSS

0.4AI Score

0.014EPSS

2019-11-14 12:00 AM
24
openbugbounty
openbugbounty

kb.asicentral.com Cross Site Scripting vulnerability

Open Bug Bounty ID: OBB-926505 Security Researcher geeknik Helped patch 8958 vulnerabilities Received 8 Coordinated Disclosure badges Received 21 recommendations , a holder of 8 badges for responsible and coordinated disclosure, found a security vulnerability affecting kb.asicentral.com website...

0.2AI Score

2019-08-03 08:21 PM
3
packetstorm

0.6AI Score

0.97EPSS

2016-04-27 12:00 AM
1496
zdt
zdt

RomPager 4.34 - Misfortune Cookie Router Authentication Bypass

Exploit for hardware platform in category web...

7.8AI Score

0.019EPSS

2016-04-27 12:00 AM
67
exploitpack
exploitpack

RomPager 4.34 (Multiple Router Vendors) - Misfortune Cookie Authentication Bypass

RomPager 4.34 (Multiple Router Vendors) - Misfortune Cookie Authentication...

0.5AI Score

0.97EPSS

2016-04-27 12:00 AM
79
openbugbounty
openbugbounty

care2.com XSS vulnerability

Vulnerable URL: http://www.care2.com/c2c/people/tag/role-models/Neal Barnard M.D.'"> Details: Description| Value ---|--- Patched:| No Latest check for patch:| 26.07.2017 Vulnerability type:| XSS Vulnerability status:| Publicly disclosed Alexa Rank| 3969 Google Pagerank| 6 VIP website status:| Ye...

6.3AI Score

2016-01-19 11:05 AM
9
openbugbounty
openbugbounty

care2.com XSS vulnerability

Vulnerable URL:...

6.9AI Score

2016-01-19 11:02 AM
7
seebug

7.1AI Score

2014-07-01 12:00 AM
11
seebug
seebug

shopnc最新版存储型xss漏洞

简要描述: shopnc存储型xss漏洞 详细说明: shopnc版本测试http://www.shopnctest.com/c2c/2013/demo/ shopnc用户个人主页处存在存储型XSS,可以获取用户敏感cookie信息。 在买家首页,分享心情处 测试代码为:"&gt;<img src />&lt;scriPt &gt;alert(document.cookie)&lt;/scripT&gt;// cookie收信平台 "&gt;<img src />&lt;scriPt...

7.1AI Score

2014-04-03 12:00 AM
13
seebug
seebug

ShopNC一处信息泄露可导致任意用户订单泄露

简要描述: ShopNC在前台的用户隐私信息防护做得很好,但忽略了一处api的防护,导致漏洞产生 漏洞可直接获取包含用户订单详情的json字符串 详细说明: 使用官方商城做演示(http://www.shopnctest.com/c2c/2013/test/ 用户名shopnc 密码shopnc) url:http://www.shopnctest.com/c2c/2013/test/mobile/28aeb56bf14c9a5f826f8ad65bc6d7f0.php?commend=order_detail&order_id=570 oder_id变量可遍历 正确返回是这样的: ...

7.1AI Score

2014-02-19 12:00 AM
7
cve
cve

CVE-2013-7193

Multiple SQL injection vulnerabilities in C2C Forward Auction Creator 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) pa parameter to auction/asp/list.asp, or the (2) UserID or (3) Password to...

8.8AI Score

0.002EPSS

2013-12-21 12:55 AM
21
nvd
nvd

CVE-2013-7193

Multiple SQL injection vulnerabilities in C2C Forward Auction Creator 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) pa parameter to auction/asp/list.asp, or the (2) UserID or (3) Password to...

8.5AI Score

0.002EPSS

2013-12-21 12:55 AM
prion
prion

Sql injection

Multiple SQL injection vulnerabilities in C2C Forward Auction Creator 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) pa parameter to auction/asp/list.asp, or the (2) UserID or (3) Password to...

9.3AI Score

0.002EPSS

2013-12-21 12:55 AM
1
cvelist
cvelist

CVE-2013-7193

Multiple SQL injection vulnerabilities in C2C Forward Auction Creator 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) pa parameter to auction/asp/list.asp, or the (2) UserID or (3) Password to...

8.5AI Score

0.002EPSS

2013-12-21 12:00 AM
exploitpack
exploitpack

C2C Forward Auction Creator 2.0 - auctionasplist.asp?pa SQL Injection

C2C Forward Auction Creator 2.0 - auctionasplist.asp?pa SQL...

1.1AI Score

2013-12-16 12:00 AM
7
exploitpack
exploitpack

C2C Forward Auction Creator - auctioncaspAdmin.asp SQL Injection (Admin Authentication Bypass)

C2C Forward Auction Creator - auctioncaspAdmin.asp SQL Injection (Admin Authentication...

0.8AI Score

2013-12-16 12:00 AM
11
Total number of security vulnerabilities70