Metasploit: Free Float FTP Server USER Command Buffer Overflow
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and...
View ArticleVisual DuxDebugger 64-bit debugger disassembler for Windows
OVERVIEWDownload Visual DuxDebuggerVisual DuxDebugger is a 64-bit debugger disassembler for Windows, especially useful when source code is unavailable.The user interface is very intuitive so it makes...
View ArticlePost-HITB Talk clarifications on Aircraft hack
After reading some of the news related to my talk at HITB 2013, I am writing this post with the goal of clarifying some misunderstandings, probably due to the lack of time I had during the talk,...
View ArticleBoston bombing link redirecting to an Exploit Kit spreading Kelihos malware...
Click on the following link to access analysis for http://213.34.205.27/boston.html .........http://client.honeyproxy.org/analysis/34cda003014e4fae
View ArticleMobile Users Well Aware of Fraud but, for Many, Convenience Trumps Security...
National Jumio Study Finds Over One in Four Mobile and Tablet Users Victims of Online or Mobile Fraud; Consumers Expect to Increasingly Transact on Mobile Regardless of RiskPALO ALTO, CA--(Marketwired...
View ArticleNew research reveals scale of damage to customer confidence that privacy...
LONDON, April 18, 2013 /PRNewswire/ -- A global study of consumer attitudes towards company stewardship of personal data conducted by the Economist Intelligence Unit (EIU) shows that data breaches can...
View ArticleMetasploit: SAP ConfigServlet OS Command Execution
require 'msf/core'class Metasploit3 < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Scanner def initialize(info = {}) super(update_info(info,...
View ArticleFake SourceForge site distributes malware
We spotted malware hosted on hxxp://sourceforgechile.net/ a couple of days ago. The website is not currently responding, but appears to been set up as a fake and malicious version of the popular...
View ArticleGroup-IB: online trading and stock brokerage attacked by hacker’s
17.04.2013 Moscow – Group-IB has found a new kind of malware, targeting the stock brocking application QUIK. It was detected during several targeted attacks starting in November 2012 where the...
View ArticleWarning! Hackers are exploiting Waco explosion news to spread malware
Once again, cybercriminals are leaping at the opportunity to take advantage of breaking news stories to spread malware.The latest example, coming just days after malware authors exploited interest in...
View ArticleJava 7 Update 21 Exploit Code
While I was working on rewriting IKVM's dynamic binding support based on method handles I stumbled into a rather serious bug in the Oracle Java implementation. It allowed any code to overwrite public...
View Article[RHSA-2013:0757-01] Critical: java-1.7.0-oracle security update
===================================================================== Red Hat Security AdvisorySynopsis: Critical: java-1.7.0-oracle security updateAdvisory ID:...
View Article[RHSA-2013:0758-01] Critical: java-1.6.0-sun security update
===================================================================== Red Hat Security AdvisorySynopsis: Critical: java-1.6.0-sun security updateAdvisory ID:...
View ArticleGnew 2013.1 Multiple Vulnerabilities
################################################################################Description:Gnew is a simple content management system. It is fully customizable using a template system, and supports...
View ArticleUS-CERT Current Activity - Apple Releases Security Updates for Safari
National Cyber Awareness SystemApple Releases Security Updates for SafariOriginal release date: April 18, 2013Apple has released security updates for Safari 6.0.4 WebKit to addressmultiple...
View ArticleGroup Name Enumeration Vulnerability in Cisco IKE Implementation
Trustwave SpiderLabs Security Advisory TWSL2013-004:Group Name Enumeration Vulnerability in Cisco IKE Implementationhttps://www.trustwave.com/spiderlabs/advisories/TWSL2013-004.txtPublished:...
View ArticleXen Security Advisory 46 (CVE-2013-1919) - Several access permission issues...
Xen Security Advisory CVE-2013-1919 / XSA-46 version 3 Several access permission issues with IRQs for unprivileged guestsUPDATES IN VERSION...
View ArticleArticle 11
Xen Security Advisory CVE-2013-1917 / XSA-44 version 3 Xen PV DoS vulnerability with SYSENTERUPDATES IN VERSION 3====================Backported patch for...
View ArticleXen Security Advisory 50 (CVE-2013-1964) - grant table hypercall...
Xen Security Advisory CVE-2013-1964 / XSA-50 grant table hypercall acquire/release imbalanceISSUE DESCRIPTION=================When releasing a non-v1 non-transitive grant after doing a...
View ArticleSWFUpload
#### Title : SWFUpload v.ALL <= (Object Injection/CSRF) Vulnerabilities# Author : KedAns-Dz# E-mail : ked-h (@hotmail.com / @1337day.com)# Home : Hassi.Messaoud (30500) - Algeria# Web Site :...
View Article