Multiple NULL Pointer Dereference Vulnerabilities in Corel Quattro Pro X6
Advisory ID: HTB23112Product: Corel Quattro Pro X6 Standard EditionVendor: Corel CorporationVulnerable Version(s): 16.0.0.388, other versions may be also affectedTested Version: 16.0.0.388 on Windows 7...
View ArticleMLS Property Finder Improper Access Control Vulnerability
DORKS (How to find the target) :================================intext:How can MLS Property Finder benefit youintext:"Do not use commas in your figures"...
View ArticleSomeone Has A Secret Crush on You! and Other Social Engineering Ploys That...
Application Security Leader Veracode Shows How Hacking Hearts and Minds Can Lead to Data Loss or WorseBURLINGTON, Mass.--(BUSINESS WIRE)--Veracode, Inc., the leader in cloud-based application security...
View ArticleThreat Outbreak Alert: Fake Shipping Documents E-mail Messages
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain an attachment of documents for the recipient. The text in the...
View ArticleThreat Outbreak Alert: Fake LogMeIn Account Notification E-mail Messages
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain an account lockout notification from LogMeIn.com for the...
View ArticleThreat Outbreak Alert: Fake Xerox Scanned Image Attachment E-mail Messages
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain a scanned document from a Xerox WorkCentre device. The text in...
View ArticleThreat Outbreak Alert: Fake Keybank Credit Advice Notification E-mail Messages
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain credit advice for the recipient. The text in the e-mail message...
View ArticleThreat Outbreak Alert: Fake German Master Credit Card Offer E-mail Messages
DescriptionCisco Security Intelligence Operations has detected significant activity related to German-language spam e-mail messages that claim to contain a credit card offer for the recipient. The text...
View ArticleThreat Outbreak Alert: Fake Portuguese Debt Collections E-mail Messages
DescriptionCisco Security Intelligence Operations has detected significant activity related to Portuguese-language spam e-mail messages that claim to contain a debt collection notification for the...
View Article2012 Web Malware Trends Report Summary
Sucuri is a website security company focused on the detection and remediation of web malware. In 2012, via our SiteCheck scanner, we scanned 9,953,729 unique domains. This small report is based on the...
View ArticleRedkit Malvertising Attack Via Zedo
Meet the Face of Evil.Would you believe that this:is actually a cover for this?The latter image is a screenshot of Redkit, a Russian-made exploit kit designed to distribute malware quickly and...
View Articlesmiasm reverse engineering framework
everse engineering framework in pythonThis is a meta repository for :miasm: http://code.google.com/p/miasm/elfesteem: http://hg.secdev.org/elfesteem/grandalf: https://github.com/bdcht/grandalf/What is...
View ArticleFake Adobe Flash Updater in 173.246.102.2 - Win32/Fareit downloads...
This story is all started from an EK landing page at:?1"h00p://17.247nycr.com/news/breaks-harmless.php"in the IP: 173.246.102.2At the below network...
View ArticleReversing a Botnet
Howdy fellow crackers and hackers alike! Have I got a treat for you? A live botnet.The other day at work, I encountered a number of machines all attacking other hosts. Normally its just one machine,...
View ArticleDontPhishMe is an Anti-Phishing addon for Mozilla Firefox
DontPhishMe 1.7.6by MyCERT, DzulDontPhishMe is an Anti-Phishing addon for Mozilla Firefox which utilizes the pattern matching techniques to provide the Malaysian Internet user with information and...
View ArticleDEP ASLR bypass without ROP JIT : CanSecWest2013 Slides and Analysis
I have my own talk from CanSecwest to blog about but this one is more interesting and the most awaited one. So here are the slides, I will add my own analysis and test cases to this blog entry later.Yu...
View ArticleMetasploit: SCADA 3S CoDeSys Gateway Server Directory Traversal
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of...
View ArticleMetasploit: Firebird Relational Database CNCT Group Number Buffer Overflow
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of...
View Article[ MDVSA-2013:021 ] java-1.6.0-openjdk
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory...
View ArticleGoogle Fusion Tables XSS
# Title: Google Fusion Tables XSS (HTML Injection) Vulnerability# Release Date: 07/03/2013# Author: Junaid Hussain - [ illSecure Research Group ]# Contact: illSecResearchGroup@Gmail.com | Website:...
View Article