WahmShoppes eStore Cross Site Scripting / SQL Injection
#+++++++++++++++++++++++++++++++++++++++++++++++++++++++++# Title : multiple Vulnerability in "WahmShoppes eStore"# Author : alieye# vendor : http://www.wahmshoppes.com/# Contact : cseye_ut@yahoo.com#...
View ArticleOn 6/5, 65 Things We Know About NSA Surveillance That We Didn’t Know a Year Ago
t’s been one year since the Guardian first published the Foreign Intelligence Surveillance Court order, leaked by former NSA contractor Edward Snowden, that demonstrated that the NSA was conducting...
View ArticlePaper: AMAL: High-Fidelity, Behavior-based Automated Malware Analysis and...
This paper introduces AMAL, an operational automated and behaviorbased malware analysis and labeling (classification and clustering)system that addresses many concerns and shortcomings of...
View ArticleThe danger of the latest NTP attacks
Who would have imagined that Network Time Protocol (NTP) — such an innocuous protocol designed to synchronise the clock on your laptop, smartphone, tablet, and network infrastructure devices — could be...
View ArticleHow I discovered CCS Injection Vulnerability (CVE-2014-0224)
Hello. My name is Masashi Kikuchi. Here is my story how I find the CCS Injection Vulnerability. (CVE-2014-0224)more...
View ArticleAnalyzing Android ‘Simplocker’ ransomware
Recently we came across the sample of a new ransonware ‘Simplocker’ for Android. The ransomware encrypts the files present on SD card and later it demands ransom from victim to decrypt the files.File...
View ArticleFrom Patch to Crash, the story of MS13-089
TL;DR:In this post I discuss the journey that we took in triggering MS13-089 aka The Graphics Device Interface Integer Overflow and how we developed a Proof of Concept that then triggers a Heap...
View ArticleAn Analysis of PlugX Using Process Dumps from High-Resolution Malware Analysis
Targeted attacks and so-called APTs (advanced persistent threats) come in many forms and colors. Very often, in-house malware analysis teams want to go beyond the detection information offered by...
View ArticleSSHCure: SSH Intrusion Detection Using NetFlow and IPFIX
SSHCure is an Intrusion Detection System for SSH, developed at the University of Twente. It allows analysing large amounts of flow data and is the first IDS capable of identifying actual compromises....
View ArticleA Study in Bots: LoBOTomy
In my last post, I covered the Madness Pro botnet in detail, but analyzing what makes this bot tick is only one side of the research. In this post, we give Madness Pro a lobotomy, detailing various...
View ArticleTrend Micro OfficeScan – A chain of bugs
Analyzing the security of security software is one of my favorite research areas: it is always ironic to see software originally meant to protect your systems open a gaping door for the attackers....
View ArticleRpcView
A free and powerful tool to explore all RPC functionalities present on a Microsoft systemmore here.......http://rpcview.org/index.html
View ArticleSEC Consult SA-20140606-0 :: Multiple critical vulnerabilities in WebTitan
SEC Consult Vulnerability Lab Security Advisory < 20140606-0 >======================================================================= title: Multiple critical vulnerabilities...
View Article[Onapsis Security Advisories] Multiple Hard-coded Usernames in SAP Components
Onapsis Security Advisories:Multiple Hard-coded Usernames (CWE-798) havebeen found and patched in a variety of SAP components.Summaries of the advisories with links to full versions follow:1....
View Article[Onapsis Security Advisory 2014-020] SAP SLD Information Tampering
Onapsis Security Advisory 2014-020: SAP SLD Information Tampering1. Impact on Business===================== By exploiting this vulnerability, a remote unauthenticated attackermight be able tomodify...
View Articlesecurity incident on forum.eset.com
we have been informed by our third-party forum provider that user login details of ESET Security Forum members have been compromisedmore...
View ArticlePaper: An Opportunity In Crisis- Reverse engineering of a Mac OS X malware...
This paper discusses reverse engineering of a Mac OS X malware commonly knownas Crisis or DaVinci. It shows that sophisticated Mac OS X malware, having featuresthat rival those usually seen only in...
View ArticlePaper: Illuminating The Etumbot APT Backdoor
Etumbot is a backdoor used in targeted attacks since at least March 2011. Indicators suggest that Etumbot is associated with the Numbered Panda group, also known as IXEHSE, DynCalc, and APT12....
View ArticleCVE-2014-0515 (Flash 13.0.0.182 and earlier) integrating Exploit Kits
Discovered by Kaspersky in April in watering hole attack, soon after used in operation targeting Banking information in Japan/Korea by Symantec, reached Exploit DB at begining of may, then in...
View ArticleCVE-2014-3740 - SpiceWorks Cross-site scripting
|Exploit Title: Multiple Stored XSS vulnerabilities in SpiceWorks Ticketing systemCVE: CVE-2014-3740Vendor: SpiceWorksProduct: SpiceWorks IT ticketing systemAffected versions: any version...
View Article