Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

[ MDVSA-2013:004 ] tomcat5

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2013:004http://www.mandriva.com/security/...

View Article


CyberLink PowerDVD #0day

1.Description:The ntk_PowerDVD12.sys kernel driver distributed with CyberLing PowerDVD containsan pool overflow vulnerability in the handling of IOCTL 0x9C402404.Exploitation of this issue allows an...

View Article


Today's NIST CVE issuance's For Multiple Vulns In Adobe Products

Click on the underlined CVE for additional vuln specific infoCVE-2013-0627Summary: Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1...

View Article

bs.am Remote Add Admin Exploit

bs_am_remote_add_admin.au3BS.AM (BUSINESS SOLUTIONS) CMS REMOTE ADD ADMIN EXPLOIT.THIS IS A EXPLOIT WRITTEN IN AUTOIT SCRIPTING/PROGRAMMING LANGUAGE.ON SUCCESSFULL REMOTE EXPLOITATION IT WILL NEW ADMIN...

View Article

Java 7 Update 10 remote code execution vulnerability

OverviewJava 7 Update 10 and earlier contain an unspecified vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.DescriptionJava 7 Update 10...

View Article


new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus...

This report describes any new scripts/modules/exploits added to Nmap,OpenVAS, Metasploit, and Nessus since yesterday.== OpenVAS plugins (3) ==r15109...

View Article

Global Cyber Security Market to be Worth $68.34Bn in 2013 - New Market Study...

Analysis indicates that the global cyber security market is set to be worth $68.34bn in 2013, as exceedingly high-demand continues for information security systems across governments, global...

View Article

Gazzang Capitalizes on Big Data Security, Reports Record 2012

Linux Data Security Leader Closes $4 Million Investment Led by Austin VenturesAUSTIN, Texas--(BUSINESS WIRE)--Gazzang, the Linux data security company, today announced the company recently completed...

View Article


Application Security, Inc.’s TeamSHATTER Discovers Nine Database...

Researchers Credited with Reporting Critical Vulnerabilities that Allow An Attacker to Take Full Control of the Sybase ServerNEW YORK--(BUSINESS WIRE)--Application Security, Inc. (AppSecInc), the...

View Article


TrustGo Releases Q4 Mobile Mayhem Report

43% Growth in 'High Risk' Apps Underscores the Unique Nature of the Mobile Security ChallengeSANTA CLARA, CA--(Marketwire - Jan 10, 2013) - TrustGo Mobile Inc. (TrustGo), a leading mobile security...

View Article

VDC Research Predicts M2M Market to Exceed $25B by 2016

eading M2M Research Firm Releases Data that Supports the Growing Importance of Connectivity, Data Analysis and Security as a Competitive AdvantageNatick, MA (PRWEB) January 10, 2013VDC Research (VDC),...

View Article

Babel HMAC Cryptographic Authentication

Abstract   This document describes a cryptographic authentication mechanism for   Babel routing protocol, updating, but not superceding RFC 6126.  The   mechanism allocates two new TLV types for the...

View Article

Nagios history.cgi Remote Command Execution Exploit

#!/usr/bin/python## CVE-2012-6096 - Nagios history.cgi Remote Command Execution# ===========================================================# Another year, another reincarnation of classic and trivial#...

View Article


Hero Framework 3.76 Multiple XSS Vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1Advisory: Hero Framework 3.76 Multiple Cross-site ScriptingvulnerabilitiesAdvisory ID: SSCHADV2012-023Author: Stefan SchurtzAffected Software: Successfully...

View Article

Detailed examples of two vulnerabilities in whitelisting software: SE46...

The following vulnerabilities unfortunately seem to be largely unknown in public even though they are about a year old by now. They have both been patched by the vendors after I discovered them and...

View Article


Cisco Linksys Remote Preauth 0day Root Exploit

DefenseCode Security Advisory (UPCOMING): Cisco Linksys Remote Preauth 0day Root ExploitStory behind the vulnerability...Months ago, we've contacted Cisco about a remote preauth (root access)...

View Article

U.S. Cities Relying on Precog Software to Predict Murder

Who needs the freaky precogs of Minority Report to predict if someone’s likely to commit murder when you have an algorithm that can do it for you?New crime-prediction software used in Maryland and...

View Article


[RHSA-2013:0153-01] Critical: Ruby on Rails security update

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1=====================================================================                   Red Hat Security AdvisorySynopsis:          Critical: Ruby on Rails...

View Article

Unchecked Source of the 0day vuln

/*Unchecked Source of the 0day vulnpbBY: KAFEINE ON JAN 10TH, 2013  | Undecrypted souce for Java EveryDay 1.7.0_10Originaly placed on https://damagelab.org/index.php?showtopic=23719&st=0From Russia...

View Article

Tumblr's troll: A wake-up call for social networks

Social networking sites are becoming victims of their own success.Hundreds – even thousands – of users can share information faster than ever before, providing a more connected world. However, as more...

View Article
Browsing all 8064 articles
Browse latest View live