exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Symantec

Email addressresearch at symantec.com
First Active2005-10-13
Last Active2011-03-08
2010 Annual Study - U.S. Cost Of A Data Breach
Posted Mar 8, 2011
Authored by Ponemon Institute, Symantec

Whitepaper called 2010 Annual Study: U.S. Cost of a Data Breach. Compliance pressures, cyber attacks targeting sensitive data drive leading IT organizations to respond quickly and pay more. This is a benchmark study of 51 U.S. companies about the financial impact, customer turnover and preventive solutions related to breaches of sensitive information.

tags | paper
SHA-256 | 9cc176c8381bb68607f066dfc318ae42eb811a57dcdcb62a70a04cca68503a77
msmask-activex.txt
Posted Aug 14, 2008
Authored by Symantec

Microsoft Visual Studio ActiveX related remote buffer overflow exploit that takes advantage of Msmask32.ocx.

tags | exploit, remote, overflow, activex
SHA-256 | 42b281578df3e61a950225690006b2d3ac30c18ff9469c529b4fa2b805d72153
SYMSA-2006-006.txt
Posted Jun 29, 2006
Authored by Symantec | Site symantec.com

Symantec Vulnerability Research Security Advisory SYMSA-2006-006 - Lotus Domino SMTP Based Denial of Service: There exists a Denial-of-Service condition within NROUTER when parsing meeting requests. The result of which is that no external or internal mail will be delivered during the processing of the malformed message.

tags | advisory, denial of service
SHA-256 | a07db676c737cf141f460ae87b3a7e88945979eb5d19aa822edba5e87bd0bc01
SYMSA-2006-005.txt
Posted Jun 27, 2006
Authored by Symantec | Site symantec.com

Symantec Vulnerability Research Security Advisory SYMSA-2006-005 - The CAPTCHA component for ASP.NET provided by Lanap may be completely bypassed, thus undermining the security benefit of the CAPTCHA technology.

tags | advisory, asp
advisories | CVE-2006-2918
SHA-256 | 1f6d7933062e59e54f1c638456743c291e4c7a8b3589dfbd6a0ef9f18607c331
SYMSA-2006-004.txt
Posted Jun 14, 2006
Authored by Symantec | Site symantec.com

Symantec Vulnerability Research Security Advisory SYMSA-2006-004: A remote code execution vulnerability exists in the Graphics Rendering Engine because of the way that it handles Windows Metafile (WMF) images.

tags | advisory, remote, code execution
systems | windows
SHA-256 | 982b1399a8794dfefe7b7714ca5cd2e19a0ffab9759434a3c1669abe0692e2a7
symantec-veritas.txt
Posted Oct 13, 2005
Authored by Symantec | Site symantec.com

Symantec Security Advisory - SYM05-018 - The remote exploitation of a format string overflow vulnerability in the Java user-interface authentication service, bpjava-msvc, running on VERITAS NetBackup servers and agents, could potentially allow remote attackers to execute arbitrary code on a targeted system with elevated privileges.

tags | advisory, java, remote, overflow, arbitrary
SHA-256 | 1cc31983e1c3e65574287c445af9190ef61cba27c7dbd6c1ee2f78bdf01b3cfa
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close