what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Symantec

Email addressresearch at symantec.com
First Active2005-10-13
Last Active2011-03-08
2010 Annual Study - U.S. Cost Of A Data Breach
Posted Mar 8, 2011
Authored by Ponemon Institute, Symantec

Whitepaper called 2010 Annual Study: U.S. Cost of a Data Breach. Compliance pressures, cyber attacks targeting sensitive data drive leading IT organizations to respond quickly and pay more. This is a benchmark study of 51 U.S. companies about the financial impact, customer turnover and preventive solutions related to breaches of sensitive information.

tags | paper
SHA-256 | 9cc176c8381bb68607f066dfc318ae42eb811a57dcdcb62a70a04cca68503a77
msmask-activex.txt
Posted Aug 14, 2008
Authored by Symantec

Microsoft Visual Studio ActiveX related remote buffer overflow exploit that takes advantage of Msmask32.ocx.

tags | exploit, remote, overflow, activex
SHA-256 | 42b281578df3e61a950225690006b2d3ac30c18ff9469c529b4fa2b805d72153
SYMSA-2006-006.txt
Posted Jun 29, 2006
Authored by Symantec | Site symantec.com

Symantec Vulnerability Research Security Advisory SYMSA-2006-006 - Lotus Domino SMTP Based Denial of Service: There exists a Denial-of-Service condition within NROUTER when parsing meeting requests. The result of which is that no external or internal mail will be delivered during the processing of the malformed message.

tags | advisory, denial of service
SHA-256 | a07db676c737cf141f460ae87b3a7e88945979eb5d19aa822edba5e87bd0bc01
SYMSA-2006-005.txt
Posted Jun 27, 2006
Authored by Symantec | Site symantec.com

Symantec Vulnerability Research Security Advisory SYMSA-2006-005 - The CAPTCHA component for ASP.NET provided by Lanap may be completely bypassed, thus undermining the security benefit of the CAPTCHA technology.

tags | advisory, asp
advisories | CVE-2006-2918
SHA-256 | 1f6d7933062e59e54f1c638456743c291e4c7a8b3589dfbd6a0ef9f18607c331
SYMSA-2006-004.txt
Posted Jun 14, 2006
Authored by Symantec | Site symantec.com

Symantec Vulnerability Research Security Advisory SYMSA-2006-004: A remote code execution vulnerability exists in the Graphics Rendering Engine because of the way that it handles Windows Metafile (WMF) images.

tags | advisory, remote, code execution
systems | windows
SHA-256 | 982b1399a8794dfefe7b7714ca5cd2e19a0ffab9759434a3c1669abe0692e2a7
symantec-veritas.txt
Posted Oct 13, 2005
Authored by Symantec | Site symantec.com

Symantec Security Advisory - SYM05-018 - The remote exploitation of a format string overflow vulnerability in the Java user-interface authentication service, bpjava-msvc, running on VERITAS NetBackup servers and agents, could potentially allow remote attackers to execute arbitrary code on a targeted system with elevated privileges.

tags | advisory, java, remote, overflow, arbitrary
SHA-256 | 1cc31983e1c3e65574287c445af9190ef61cba27c7dbd6c1ee2f78bdf01b3cfa
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close