EasyWebScripts eBay Clone Script SQL Injection / XSS Vulnerabilities
################################################################################## __ _ _ ____ / /___ _____ (_)_____________...
View ArticleGoogle’s Android Reborn as Network-Hacking Kit
The folks at security tools company Pwnie Express have built a tablet that can bash the heck out of corporate networks. Called the Pwn Pad, it’s a full-fledged hacking toolkit built atop Google’s...
View Articlenew scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus...
This report describes any new scripts/modules/exploits added to Nmap,OpenVAS, Metasploit, and Nessus since yesterday.== Metasploit modules (1) ==r16477...
View ArticleMetasploit: MS13-009 Microsoft Internet Explorer SLayoutRun Use-After-Free
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and...
View ArticlePhotodex ProShow Producer 5.0.3297 Insecure Library Load
1. ADVISORY INFORMATION-----------------------Product: Photodex ProShow ProducerVendor URL: www.photodex.comType: Uncontrolled Search Path Element [CWE-427]Date found:...
View ArticleRix4Web Portal Remote Blind SQL Injection Vulnerability
################################################### Exploit Title: Rix4Web Portal Remote Blind SQL Injection Vulnerability### Date: 02/23/2013### Author: L0n3ly-H34rT### Contact:...
View ArticleIPMap 2.5 Shell Upload
Title:======IPMap v2.5 iPad iPhone - Arbitrary File Upload Web VulnerabilitiesDate:=====2013-02-18References:===========http://www.vulnerability-lab.com/get_content.php?id=866VL-ID:=====866Common...
View ArticleKayako Fusion 4.51.1891 Cross Site Scripting
Title:======Kayako Fusion v4.51.1891 - Multiple Web VulnerabilitiesDate:=====2013-01-22References:===========http://www.vulnerability-lab.com/get_content.php?id=824ID: SWIFT-3119URL:...
View Article[SECURITY] [DSA 2631-1] squid3 security update
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1- -------------------------------------------------------------------------Debian Security Advisory DSA-2630-1...
View ArticleThe near impossible battle against hackers everywhere
San Francisco: Dire warnings from Washington about a "cyber Pearl Harbor" envision a single surprise strike from a formidable enemy that could destroy power plants nationwide, disable the financial...
View ArticleAnother Clever Drive-By
This is yet another drive-by that was challenging to find. It delivered payloads from two different exploit packs making it very cruel too. Below is the infected webpage. I kept visiting this page,...
View ArticleFlatstick CMS PHP Hash Collision Denial Of Service Vulnerability
################################################################################ Exploit Title: Flatstick CMS PHP Hash Collision Denial Of Service Vulnerability# Google Dork: site:*.nz...
View ArticleTeamViewer V8.0.16642 Insecure Library Load
1. ADVISORY INFORMATION-----------------------Product: TeamViewer V8.0.16642 Insecure Library LoadVendor URL: http://www.teamviewer.com/fr/index.aspxDate found: 2013-02-24Date published:...
View ArticleBypassing Windows ASLR using “skype4COM” protocol handler
While investigating an unrelated issue using SysInternals Autoruns tool I spotted a couple of protocol handlers installed on the system by Skype. Knowing that protocol handlers can be loaded by...
View ArticleGoogle Glasses: Hacked and being used as zombies
Google Glasses: Espionage, cyber crime and cyber warfare. Recently Google published their awesome Google Glass product. This product will take away the smart phone services and will put them in your...
View Articlebadassproxy-0.1 for Mac
File: BadAssProxy-0.1.dmg 11.8 MBDescription:SHA1 Checksum:f51ec9023eccc582be64b3a67d86ac004cd5877c What's this?Source...
View ArticleNew Anti-Piracy System to Hit U.S. Internet Users on Monday
Starting Monday, most U.S. Internet users will be subject to a new copyright enforcement system that could force them to complete educational programs, and even slow their Internet speeds to a crawl.A...
View ArticleStudy Reveals 50 Percent Loss in Productivity When Visual Privacy Is At Risk
3M announces full study findings at RSA ConferenceRSA Conference 2013ST. PAUL, Minn.--(BUSINESS WIRE)--A new study conducted by the Ponemon Institute, commissioned by 3M, the maker of privacy filters...
View ArticleNew Study Reveals 25% of People Store Intimate Images on Their Mobile Device
AVG Technologies’ survey shows consumers are playing fast and loose with their personal privacy, yet are failing to embrace practical features due to security concernsMobile World Congress...
View ArticleWhitepaper From Twilio Addresses Strategies Businesses Can Use to Protect...
Simple Yet Powerful: Two Factor Authentication Offers Fast and Easy Way to Increase SecuritySAN FRANCISCO, Feb. 25, 2013 /PRNewswire/ -- Twilio, the market leader in cloud communications, has released...
View Article