Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

HP-UX Running BIND, Remote Domain Name Revalidation

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1Note: the current version of the following document is available...

View Article


Joomla Component com_movm SQL Injection Exploit (perl)

#Exploit Title: Joomla com_movm SQL Injection exploit#Dork: inurl:"index.php?option=com_movm"#Date: 24/12/2012#Exploit Author: D35m0nd142#Vendor Homepage: http://www.joomla.org#Tested on Ubuntu...

View Article


Wordpress Themes grou-random-image-widget Full Path Disclosure

-------------------------------------------------------------------------------Wordpress Themes- grou-random-image-widget Full Path Disclosure...

View Article

CA IdentityMinder Vulnerabilities

CA20121220-01: Security Notice for CA IdentityMinderCA Technologies Support is alerting customers to two potential risks in CA IdentityMinder (formerly known as CA Identity Manager). Two...

View Article

Persistent XSS vulnerability in WP-UserOnline

In 2010 I've disclosed multiple vulnerabilities (Cross-Site Scripting andFull path disclosure) in WordPress plugin WP-UserOnlineAnd recently I've disclosed  the exploit for persistent XSS vulnerability...

View Article


Netransfers 2.1 XSS / LFI / Traversal

 Exploit Title: Netransfers V2.1 Multiple vulnerability# Date: 19.12.2012# Exploit Author: d3b4g# Vendor Homepage: http://marioemoreno.com/netransfers-demo/# Tested on:Windows 7# Blog: d3b4g.me...

View Article

PHP-CGI Argument Injection Remote Code Execution

#!/usr/bin/pythonimport requestsimport sysprint """CVE-2012-1823 PHP-CGI Arguement Injection Remote Code ExecutionThis exploit abuses an arguement injection in the PHP-CGI wrapperto execute code as the...

View Article

Metasploit: Microsoft SQL Server Database Link Crawling Command Execution...

## This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and...

View Article


Metasploit: IBM Lotus Notes Client URL Handler Command Injection

###Credit: Moritz Jodeit, Sean de Regge, juan vazquez# This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit#...

View Article


Top 10 IT security stories of 2012

nterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack...

View Article

Open-Realty CMS 3.x Cross Site Request Forgery (CSRF) Vulnerability

1. OVERVIEWOpen-Realty CMS 3.x versions are vulnerable to Cross Site Request Forgery.2. BACKGROUNDOpen-Realty is the world's leading real estate listing marketing andmanagement CMS application, and has...

View Article

Open-Realty CMS 3.x Persistent Cross Site Scripting (XSS) Vulnerability

1. OVERVIEWOpen-Realty CMS 3.x versions are vulnerable to Persistent Cross SiteScripting (XSS).2. BACKGROUNDOpen-Realty is the world's leading real estate listing marketing andmanagement CMS...

View Article

Developers of FlowTraq to Present a Breakout Session – “Identifying Network...

ProQSys, provider of scalable network security software for enterprise environments, announces Alexander Barsamian, FlowTraq R&D lead, will present a breakout discussion and NetFlow-based...

View Article


Image may be NSFW.
Clik here to view.

(Inclusive Funny Old School Short XMAS RAP) A year on the run: El Reg tracks...

Whoever thought 2012 would be boring without Steve Jobs has been proven wrong ... Tech industry scandal-watchers have been blessed with colourful antics from the likes of Kim Dotcom, Larry Ellison,...

View Article

Image may be NSFW.
Clik here to view.

THC-Hydra 7.4.1 logon cracker New Release

THC-Hydra A very fast network logon cracker which support many different services. See feature sets and services coverage page - incl. a speed comparison against ncrack and medusa Current Version:...

View Article


SQLi Authentication Bypass Short List

This list can be used by penetration testers when testing for SQL injection authentication bypass.A penetration tester can use it manually or through burp in order to automate the process.The creator...

View Article

Metasploit: WordPress Asset-Manager PHP File Upload Vulnerability

### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and...

View Article


Metasploit: WordPress WP-Property PHP File Upload Vulnerability

### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and...

View Article

Video: TOP TEN WEB DEFENSES

Description: AbstractWe cannot hack or firewall our way secure. Application programmers need to learn to code in a secure fashion if we have any chance of providing organizations with proper defenses...

View Article

Govt draws up plan to revamp cyber security of critical sectors

NEW DELHI: In its bid to meet the challenge of ever increasing cyber attacks and security in the virtual world, the government has set in motion a five-year project to revamp the entire cyber security...

View Article
Browsing all 8064 articles
Browse latest View live