Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Metasploit: Free Float FTP Server USER Command Buffer Overflow

### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and...

View Article


Visual DuxDebugger 64-bit debugger disassembler for Windows

OVERVIEWDownload Visual DuxDebuggerVisual DuxDebugger is a 64-bit debugger disassembler for Windows, especially useful when source code is unavailable.The user interface is very intuitive so it makes...

View Article


Post-HITB Talk clarifications on Aircraft hack

After reading some of the news related to my talk at HITB 2013, I am writing this post with the goal of clarifying some misunderstandings, probably due to the lack of time I had during the talk,...

View Article

Boston bombing link redirecting to an Exploit Kit spreading Kelihos malware...

Click on the following link to access analysis for http://213.34.205.27/boston.html  .........http://client.honeyproxy.org/analysis/34cda003014e4fae

View Article

Mobile Users Well Aware of Fraud but, for Many, Convenience Trumps Security...

National Jumio Study Finds Over One in Four Mobile and Tablet Users Victims of Online or Mobile Fraud; Consumers Expect to Increasingly Transact on Mobile Regardless of RiskPALO ALTO, CA--(Marketwired...

View Article


New research reveals scale of damage to customer confidence that privacy...

LONDON, April 18, 2013 /PRNewswire/ -- A global study of consumer attitudes towards company stewardship of personal data conducted by the Economist Intelligence Unit (EIU) shows that data breaches can...

View Article

Metasploit: SAP ConfigServlet OS Command Execution

require 'msf/core'class Metasploit3 < Msf::Auxiliary    include Msf::Exploit::Remote::HttpClient    include Msf::Auxiliary::Scanner    def initialize(info = {})        super(update_info(info,...

View Article

Fake SourceForge site distributes malware

We spotted malware hosted on hxxp://sourceforgechile.net/ a couple of days ago. The website is not currently responding, but appears to been set up as a fake and malicious version of the popular...

View Article


Group-IB: online trading and stock brokerage attacked by hacker’s

17.04.2013 Moscow – Group-IB has found a new kind of malware, targeting the stock brocking application QUIK. It was detected during several targeted attacks starting in November 2012 where the...

View Article


Warning! Hackers are exploiting Waco explosion news to spread malware

Once again, cybercriminals are leaping at the opportunity to take advantage of breaking news stories to spread malware.The latest example, coming just days after malware authors exploited interest in...

View Article

Java 7 Update 21 Exploit Code

While I was working on rewriting IKVM's dynamic binding support based on method handles I stumbled into a rather serious bug in the Oracle Java implementation. It allowed any code to overwrite public...

View Article

[RHSA-2013:0757-01] Critical: java-1.7.0-oracle security update

=====================================================================                   Red Hat Security AdvisorySynopsis:          Critical: java-1.7.0-oracle security updateAdvisory ID:...

View Article

[RHSA-2013:0758-01] Critical: java-1.6.0-sun security update

=====================================================================                   Red Hat Security AdvisorySynopsis:          Critical: java-1.6.0-sun security updateAdvisory ID:...

View Article


Gnew 2013.1 Multiple Vulnerabilities

################################################################################Description:Gnew is a simple content management system. It is fully customizable using a template system, and supports...

View Article

US-CERT Current Activity - Apple Releases Security Updates for Safari

National Cyber Awareness SystemApple Releases Security Updates for SafariOriginal release date: April 18, 2013Apple has released security updates for Safari 6.0.4 WebKit to addressmultiple...

View Article


Group Name Enumeration Vulnerability in Cisco IKE Implementation

Trustwave SpiderLabs Security Advisory TWSL2013-004:Group Name Enumeration Vulnerability in Cisco IKE Implementationhttps://www.trustwave.com/spiderlabs/advisories/TWSL2013-004.txtPublished:...

View Article

Xen Security Advisory 46 (CVE-2013-1919) - Several access permission issues...

             Xen Security Advisory CVE-2013-1919 / XSA-46                              version 3     Several access permission issues with IRQs for unprivileged guestsUPDATES IN VERSION...

View Article


Article 11

  Xen Security Advisory CVE-2013-1917 / XSA-44                              version 3                Xen PV DoS vulnerability with SYSENTERUPDATES IN VERSION 3====================Backported patch for...

View Article

Xen Security Advisory 50 (CVE-2013-1964) - grant table hypercall...

 Xen Security Advisory CVE-2013-1964 / XSA-50            grant table hypercall acquire/release imbalanceISSUE DESCRIPTION=================When releasing a non-v1 non-transitive grant after doing a...

View Article

SWFUpload

#### Title : SWFUpload v.ALL <= (Object Injection/CSRF) Vulnerabilities# Author : KedAns-Dz# E-mail : ked-h (@hotmail.com / @1337day.com)# Home : Hassi.Messaoud (30500) - Algeria# Web Site :...

View Article
Browsing all 8064 articles
Browse latest View live