Lucene search

K

WordPress Bitcoin Payments – Blockonomics Security Vulnerabilities

zdt
zdt

idev-Payments 1.0 CSRF Vulnerability

Exploit for php platform in category web...

7.1AI Score

2012-04-04 12:00 AM
12
threatpost
threatpost

Global Payments Says 1.5 Million Cards May Be Affected By Breach

UPDATED–Global Payments, the payment-processing company that was the victim of a massive data breach revealed last week, said that the attack appears to have compromised something less than 1.5 million credit card numbers and that the attack looks to have been isolated to the network in North...

0.6AI Score

2012-04-02 12:04 PM
7
threatpost
threatpost

Global Payments Inc. Acknowledges Breach

Following previous announcements from Visa and Mastercard, electronic credit card processor Global Payments Inc. acknowledged late Friday that its system was breached earlier this year. Global Payments announced via press release that a portion of its processing system had been compromised in...

0.1AI Score

2012-03-30 09:46 PM
3
thn
thn

50K Cards Compromised using Credit Card Processor

50K Cards Compromised using Credit Card Processor Some 50,000 credit and debit cardholders may have their information exposed following a security breach at Global Payments. The breach occurred sometime between between Jan. 21, 2012 and Feb. 25, 2012. Both Visa and MasterCard have confirmed...

6.8AI Score

2012-03-30 08:37 PM
4
threatpost
threatpost

Visa, MasterCard Warn Of Breach At Card Processor

UPDATE–MasterCard and Visa have confirmed that they are investigating a potentially huge data breach at one of the companies’ payment processors, which the Wall Street Journal has identified as Global Payments Inc. The credit card giants are alerting banks about a breach at a U.S. based card...

0.7AI Score

2012-03-30 06:06 PM
13
thn
thn

Kelihos Botnet with 110,000 PCs take down finally

Kelihos Botnet with 110,000 PCs take down finally Botnets are particularly insidious, using thousands of virus-infected computers which their owners are unaware are being used for sending out spam, launching denial-of-service attacks and stealing data.But taking down a botnet poses challenges....

6.8AI Score

2012-03-29 04:53 PM
6
threatpost
threatpost

Kaspersky Knocks Down Kelihos Botnet Again, But Expects Return

For the second time in six months, researchers from the Russian antivirus company, Kaspersky Lab, carried out an operation to take down the newest iteration of the Kelihos botnet, also known as “Hlux.” Microsoft and Kaspersky worked together in September, 2011, on the first Kelihos take-down. The.....

-0.2AI Score

2012-03-28 04:06 PM
6
drupal
drupal

SA-CONTRIB-2012-036 - Multiple Modules Unsupported

CVE: CVE-2012-2056 Content Lock Is a module that prevents users from concurrent editing of nodes. This module does not use a token for unlocking a content lock. This leads to a CSRF attack vector. CVE: CVE-2012-2057 Ubercart Bulk Stock Updater is an extension module for Ubercart 2.x running on...

6.8AI Score

0.004EPSS

2012-03-14 12:00 AM
3
packetstorm

0.6AI Score

2012-03-11 12:00 AM
15
zdt
zdt

Ad Manager Pro CSRF Vuln (add admin)

Exploit for php platform in category web...

7.1AI Score

2012-03-11 12:00 AM
12
threatpost
threatpost

Want lunch? Palm it over

Fed up with using swipe cards and PINs for their students’ lunch payments, a school board district in Clearwater, Fla. recently partnered with microelectronic company Fujitsu to use palm vein readers for nearly half of their 102,000 students. Pinellas County School Board District spent $120,000 to....

0.7AI Score

2012-03-08 07:07 PM
6
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Xerox Scan Attachment Email Messages on May 6, 2015

Medium Alert ID: 25325 First Published: 2012 March 6 18:23 GMT Last Updated: 2015 May 6 12:23 GMT Version: 75 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a scanned document from a Xerox WorkCentre Pro device. The text in the...

0.2AI Score

2012-03-06 06:23 PM
158
threatpost
threatpost

Indictments Reveal Anonymous's Mix Of Greed, Ideology

As information filtered out about the arrests of senior members of the group Anonymous and LulzSec on Tuesday, a portrait emerged of a group of mostly teenaged and 20 something hackers who blended greed and ideology in a string of high profile hacks stretching back more than a year. In a...

1.5AI Score

2012-03-06 06:10 PM
7
threatpost
threatpost

Google Patches 14 Chrome Bugs Ahead of Pwn2Own, Pays $30k in Special Rewards

Just two days before the annual Pwn2Own contest is set to begin at CanSecWest, Google has patched a huge set of serious vulnerabilities in its Chrome browser. In addition to the 14 high-risk flaws fixed in Chrome, the company also handed out rewards of $10,000 each to three researchers who...

AI Score

0.015EPSS

2012-03-05 01:01 PM
18
threatpost
threatpost

Cloud Service Linode Hacked, Bitcoin Accounts Emptied

A security compromise at Linode, the New Jersey-based Linux cloud provider, has warned customers that hackers breached a Web-based customer service portal used by the company and emptied the Bitcoin accounts of eight Linode customers. One Linode customer reports the theft of Bitcoins totalling...

-0.4AI Score

2012-03-02 06:18 PM
6
threatpost
threatpost

PayPal Revises Privacy Policy, User Agreement Policy

PayPal announced that it is changing both its privacy and user agreement policies, adding tweaks to its customer identification program and the way it collects and stores its customers’ personal information. The changes will take effect on April 1. Under the new policy, Paypal may collect...

-0.8AI Score

2012-02-28 02:30 PM
5
thn
thn

$60000 for Exploiting Google Chrome, Hackers at Pwnium work...

$60000 for Exploiting Google Chrome, Hackers at Pwnium work... Google has offered prizes, totalling $1 million, to those who successfully hack the Google Chrome browser at the Pwn2Own hacker contest taking place next week i.e 7 March 2012. Chrome is the only browser in the contest's six year...

6.8AI Score

2012-02-28 08:48 AM
4
threatpost
threatpost

Google Reacts to Google Wallet Security Issues

Google has temporarily disabled the provisioning of prepaid cards as the company deals with the fallout from the discovery of security vulnerabilities affecting Google Wallet. Google Wallet is a mobile payment application that enables users to store information such as credit cards on their mobile....

0.1AI Score

2012-02-12 11:40 PM
5
threatpost
threatpost

After Damaging Reports, Electronics Manufacturing Giant Foxconn Is Hacked

Members of an online hacking group that calls itself SwaggSec say they hacked systems belonging to Chinese electronics manufacturing giant Foxconn and made off with login credentials belonging to some of the company’s biggest clients. Foxconn has declined to comment. The incident comes in the wake....

0.5AI Score

2012-02-09 04:47 PM
4
vulnerlab

0.5AI Score

2012-01-25 12:00 AM
3
vulnerlab

7.1AI Score

2012-01-25 12:00 AM
29
thn
thn

SOPA in US and Censorship in India: A cocktail to destroy Internet Freedom !

SOPA in US and Censorship in India : A cocktail to destroy Internet Freedom ! As US senators mull over the SOPA(Stopping Online Piracy Act) and PIPA(Protecting Intellectual Property Act) bills, the world stands witness to a historic moment. Almost all big IT companies like Google, Wikipedia,...

6.9AI Score

2012-01-19 05:55 PM
3
thn
thn

Facebook distributing White Hat Debit Card to Bug Bounty Winners

Facebook distributing White Hat Debit Card to Bug Bounty Winners Polish IT security portal Niebezpiecznik.pl, which recently published an image of a bug bounty card given to Szymon Gruszecki, a Polish security researcher and penetration tester. Neal Poole, a junior at Brown University, has...

6.7AI Score

2012-01-01 04:46 PM
4
thn
thn

The Hacker News Hacking Awards : Best of Year 2011

The Hacker News Hacking Awards : Best of Year 2011 2011 has been labeled the "Year of the Hack" or "Epic #Fail 2011". Hacking has become much easier over the years, which is why 2011 had a lot of hacking for good and for bad. Hackers are coming up with tools as well as finding new methods for...

6.7AI Score

2011-12-31 01:00 PM
4
thn
thn

Corporate fraud vs Anonymous Analytics Group

Corporate fraud vs Anonymous Analytics Group A new financial research group, Anonymous Analytics has released a report accusing Chinese firm Chaoda Modern Agriculture of "11 years of deceit and corporate fraud". The company is one of China's largest fruit and vegetable suppliers. A faction...

7.3AI Score

2011-12-22 04:45 PM
5
thn
thn

Manila AT&T hackers linked to 26/11 Mumbai terror attack

Manila AT&T hackers linked to 26/11 Mumbai terror attack Police in the Philippines working with the US Federal Bureau of Investigation have arrested four people over a premium-line phone scam that targeted customers of the American telecommunications giant AT&T to funnel money to a Saudi-based...

6.8AI Score

2011-11-29 04:08 AM
6
nmap
nmap

bitcoin-getaddr NSE Script

Queries a Bitcoin server for a list of known Bitcoin nodes Script Arguments max-newtargets, newtargets See the documentation for the target library. Example Usage nmap -p 8333 --script bitcoin-getaddr <ip> Script Output PORT STATE SERVICE 8333/tcp open unknown | bitcoin-getaddr: | ...

9.8CVSS

-0.1AI Score

0.973EPSS

2011-11-09 06:56 PM
253
nmap
nmap

bitcoin-info NSE Script

Extracts version and node information from a Bitcoin server Example Usage nmap -p 8333 --script bitcoin-info <ip> Script Output PORT STATE SERVICE 8333/tcp open bitcoin | bitcoin-info: | Timestamp: 2018-03-09T06:25:49 | Network: main | Version: 0.7.0 | Node Id: 26855fa1ac038c12 | ...

9.8CVSS

-0.3AI Score

0.973EPSS

2011-11-09 06:56 PM
264
nvd
nvd

CVE-2010-4992

SQL injection vulnerability in the Payments Plus component 2.1.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the type parameter to...

8.4AI Score

0.001EPSS

2011-11-01 10:55 PM
6
cve
cve

CVE-2010-4992

SQL injection vulnerability in the Payments Plus component 2.1.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the type parameter to...

8.7AI Score

0.001EPSS

2011-11-01 10:55 PM
20
prion
prion

Sql injection

SQL injection vulnerability in the Payments Plus component 2.1.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the type parameter to...

9.1AI Score

0.001EPSS

2011-11-01 10:55 PM
2
cvelist
cvelist

CVE-2010-4992

SQL injection vulnerability in the Payments Plus component 2.1.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the type parameter to...

8.4AI Score

0.001EPSS

2011-11-01 10:00 PM
threatpost
threatpost

Mac OS X Trojan Goes Bitcoin Mining, Steals Files

A new Trojan targeting Mac OS X users is not only after data, but Bitcoins as well. The malware is being detected by Sophos as Miner-D, but is also known as DevilRobber. According to Sophos, the Trojan is hiding inside pirated versions of the Mac OS X image editing application GraphicConverter...

AI Score

2011-10-30 06:38 PM
5
threatpost
threatpost

Mac OS X Trojan Goes BitCoin Mining, Steals Files

A new Trojan targeting Mac OS X users is not only after data, but Bitcoins as well. The malware is being detected by Sophos as Miner-D, but is also known as DevilRobber. According to Sophos, the Trojan is hiding inside pirated versions of the Mac OS X image editing application GraphicConverter...

AI Score

2011-10-30 06:35 PM
21
threatpost
threatpost

Got Pwned? PwnedList.com Knows

With more and more victims of identity theft minted every day, figuring out if you’re one of the unlucky masses with a leaked email password is yeoman’s work. Now one security researcher is trying to make it easy with PwnedList.com, a Web site that collects leaked and stolen data, then tells...

-0.4AI Score

2011-10-27 09:54 PM
6
threatpost
threatpost

Thousands of Patients at Risk of ID Theft Following Genentech Breach

Thousands of patients seeking medical treatment may be at risk of identity theft following a breach of systems belonging to the biotech firm Genentech, according to a letter sent to New Hampshire’s Attorney General on behalf of the company late last month. As many as 3,500 patients may have had...

-0.6AI Score

2011-10-13 06:30 PM
4
thn
thn

German Researchers Break RFID Smartcard Encryption

German Researchers Break RFID Smartcard Encryption Scientists have found a way to circumvent the encryption used to protect a smartcard used to restrict access to buildings and to process public transit system payments. A team of German scientists have demonstrated a hack that lets them make...

6.7AI Score

2011-10-11 05:39 PM
3
nmap
nmap

bitcoinrpc-info NSE Script

Obtains information from a Bitcoin server by calling getinfo on its JSON-RPC interface. Script Arguments creds.global http credentials used for the query (user:pass) slaxml.debug See the documentation for the slaxml library. creds.[service] See the documentation for the creds library. http.host,...

9.8CVSS

-0.1AI Score

0.973EPSS

2011-10-07 11:49 PM
153
threatpost
threatpost

ExploitHub Offering Bounties – And Residuals – for Exploits

NSS Labs’ announced today that their penetration-testing site, Exploithub, will be offering bounties to researchers for developing exploits for12 high-value vulnerabilities. Exploithub is putting up $4,400 for working exploits against what the company describes as a “dirty dozen” of client-side...

0.5AI Score

0.97EPSS

2011-10-05 01:11 PM
24
thn
thn

HTTPS SSL encryption Vulnerable To Crypto Attack

HTTPS SSL encryption Vulnerable To Crypto Attack The secure sockets layer (SSL) and transport layer security (TLS) encryption protocol, used by millions of websites to secure Web communications via HTTPS, is vulnerable to being decrypted by attackers. Researchers have discovered a serious...

7AI Score

2011-09-25 02:45 AM
2
checkpoint_advisories
checkpoint_advisories

German Web-Servers HTTP Flooding DDoS

A Distributed Denial of Service (DDoS) threat by a Bitcoin Mining botnet has been...

6.9AI Score

2011-09-20 12:00 AM
nessus
nessus

Bitcoin Detection

The remote service is a Bitcoin node. Bitcoin is an open source, peer-to-peer digital currency, and a Bitcoin node is used by a client to communicate with other...

7AI Score

2011-09-14 12:00 AM
13
packetstorm

0.1AI Score

2011-09-14 12:00 AM
19
exploitdb

7.4AI Score

2011-09-14 12:00 AM
15
seebug

7.1AI Score

2011-09-14 12:00 AM
13
exploitpack
exploitpack

WordPress Plugin E-Commerce 3.8.6 - SQL Injection

WordPress Plugin E-Commerce 3.8.6 - SQL...

0.4AI Score

2011-09-14 12:00 AM
8
nessus
nessus

Bitcoin Installed (Mac OS X)

Bitcoin is installed on the remote Mac OS X host. It is an open source, peer-to-peer digital...

7.4AI Score

2011-09-14 12:00 AM
12
zdt
zdt

WordPress WP e-Commerce plugin <= 3.8.6 SQL Injection Vulnerability

Exploit for php platform in category web...

7.1AI Score

2011-09-13 12:00 AM
13
threatpost
threatpost

BitCoin Forum Hacked, Injected With Bill Cosby Images

A hacker compromised a digital currency forum, bitcointalk.org, stealing email addresses and hashed passwords, reading messages, and, of all things, peppering the site with images Bill Cosby, according to a report from SC Magazine. The report claims that the attacker gained root access and started....

0.3AI Score

2011-09-12 08:14 PM
13
threatpost
threatpost

A Miner Botnet: Bitcoin Mining Goes Peer-to-Peer

Identifying a botnet is not an easy task sometimes, especially when one gets lost in different components like droppers, infectors and other bad stuff. Some two weeks ago, Jose Nazario from Arbor Networks pointed me to a new varmint that appears to be another peer-to-peer bot. When executed, the...

-0.2AI Score

2011-08-19 04:58 PM
5
Total number of security vulnerabilities6256