Path Traversal Vulnerability in AWS XMS
Advisory ID: HTB23147Product: AWS XMSVendor: http://www.aws-dms.comVulnerable Version(s): 2.5 and probably priorTested Version: 2.5Vendor Notification: March 6, 2013 Vendor Patch: March 16, 2013 Public...
View ArticleMcAfee Virtual Technician ActiveX Control Insecure Method Vulnerability
Advisory ID: HTB23128Product: McAfee Virtual Technician (MVT) 6.5.0.2101Vendor: McAfeeVulnerable Version(s): 6.5.0.2101 and probably priorTested Version: 6.5.0.2101 on Windows 7 SP1 and Internet...
View ArticleCisco Security Advisory: Cisco IOS Software Resource Reservation Protocol...
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256Cisco IOS Software Resource Reservation Protocol Denial of ServiceVulnerabilityAdvisory ID: cisco-sa-20130327-rsvpRevision 1.0For Public Release 2013 March...
View ArticleCisco Security Advisory: Cisco IOS Software Zone-Based Policy Firewall...
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256Cisco IOS Software Zone-Based Policy Firewall Session InitiationProtocol Inspection Denial of Service VulnerabilityAdvisory ID:...
View ArticleCisco Security Advisory: Cisco IOS Software IP Service Level Agreement...
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256Cisco IOS Software IP Service Level Agreement VulnerabilityAdvisory ID: cisco-sa-20130327-ipslaRevision 1.0For Public Release 2013 March 27 16:00 UTC...
View ArticleCisco Security Advisory: Cisco IOS Software Protocol Translation Vulnerability
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256Cisco IOS Software Protocol Translation VulnerabilityAdvisory ID: cisco-sa-20130327-ptRevision 1.0For Public Release 2013 March 27 16:00 UTC...
View ArticleCisco Security Advisory: Cisco IOS Software Internet Key Exchange Vulnerability
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256Cisco IOS Software Internet Key Exchange VulnerabilityAdvisory ID: cisco-sa-20130327-ikeRevision 1.0For Public Release 2013 March 27 16:00 UTC...
View ArticleKonftel 300IP 2.1.2 Reboot Bypass
#!/bin/bash# Konftel 300IP SIP-based Conference phone <= 2.1.2 remote bypass reboot exploit## by Todor Donev / 03.2013 / Sofia,Bulgaria# email: todor dot donev at gmail com# type: hardware## The...
View ArticleCisco Security Advisory: Cisco IOS Software Network Address Translation...
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256Cisco IOS Software Network Address Translation VulnerabilityAdvisory ID: cisco-sa-20130327-natRevision 1.0For Public Release 2013 March 27 10:00 UTC...
View ArticleCisco Security Advisory: Cisco IOS Software Smart Install Denial of Service...
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256Cisco IOS Software Smart Install Denial of Service VulnerabilityAdvisory ID: cisco-sa-20130327-smartinstallRevision 1.0For Public Release 2013 March 27...
View Article[RHSA-2013:0687-01] Moderate: pixman security update
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1===================================================================== Red Hat Security AdvisorySynopsis: Moderate: pixman security...
View ArticlewinAUTOPWN v3.4 Released - Completing 4 years !!
Dear all, This is to announce release of winAUTOPWN version 3.4. Conceived and released in 2009, WINDOWS AUTOPWN grows strong completing its 4th year. Visit: http://winautopwn.co.nr++++++++++++++++++++...
View ArticleAST-2013-001: Buffer Overflow Exploit Through SIP SDP Header
Asterisk Project Security Advisory - AST-2013-001 Product Asterisk Summary Buffer Overflow Exploit Through SIP SDP Header Nature of Advisory Exploitable Stack Buffer Overflow Susceptibility Remote...
View ArticleAST-2013-002: Denial of Service in HTTP server
Asterisk Project Security Advisory - AST-2013-002 Product Asterisk Summary Denial of Service in HTTP server Nature of Advisory Denial of Service Susceptibility Remote Unauthenticated Sessions Severity...
View ArticleAST-2013-003: Username disclosure in SIP channel driver
Asterisk Project Security Advisory - AST-2013-003 Product Asterisk Summary Username disclosure in SIP channel driver Nature of Advisory Unauthorized data disclosure Susceptibility Remote...
View ArticleMetasploit: Java CMM Remote Code Execution
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of...
View ArticleMetasploit: v0pCr3w Web Shell Remote Code Execution
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of...
View ArticleSpammers Using Yahoo, Google To Whitewash Links
If the gigantic distributed denial of service (DDoS) attacks against the spam blacklisting operation Spamhaus wasn’t proof enough: spammers have trouble steering around blacklists and other...
View ArticleLogRhythm and Rapid7 to Host Webinar on Identifying Breaches in Real-Time for...
BOULDER, Colo.--(BUSINESS WIRE)--LogRhythm, the largest and fastest growing independent Security Information and Event Management (SIEM) provider in the world, and Rapid7, a leading provider of IT...
View ArticleNearly One in Three Consumers Who Have Lost Their Mobile Devices Still Do Not...
NQ Mobile™ finds that slightly over half of mobile device users lock themDALLAS, March 28, 2013 /PRNewswire/ -- While consumers who have lost a smartphone or had one stolen in the past are...
View Article