Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.
3af0d1f22f3669d267dde29c93584f1f6061588dcdc62dde41660a76aec55d2b
Whitepaper called the Art of Information Gathering / Footprinting. Written in Arabic.
e17e42066d7bee8999efdcd5fe7f983da2739b2a4a05c75bda00d8aa64017233
DEC Alpha Linux versions 3.0 and below local root exploit.
d76bee4c4585b03f096adb7e2ba9879f136892e3a1e26c3bf3b96050672a92de
TelEduc version 3.3.8 suffers from a remote SQL injection vulnerability.
502c12e148de850d1591013289a870c298ea18e5721ac49128802f2d722a7e01
KMPlayer version 3.0.0.1440 buffer overflow exploit that creates a malicious .mp3 file. It is written for Windows 7 and has ASLR bypass.
1540c6fca8bfe93e9d337d8daa39356863f9fac8e3c72991321f1895865f6e42
The Joomla Minitek FAQ Book component version 1.3 suffers from a remote SQL injection vulnerability.
3935ffb765b6335e991cb43fa39ea322ae92babc80d165679374bf738551a3d6
It is possible to execute an arbitrary command with root privileges on phion netfence 4.0.x, phion netfence versions prior to 4.2.15 and NG Firewall versions prior to 5.0.2 boxes with activated external authentication scheme (i.e. Active Directory). An attacker with the knowledge of an admin's username is able to perform arbitrary shell commands during the ssh login procedure on the box. The knowledge of the admin's password is not required.
fee59e2c3c8776e6ab9ed6abb4364a9562154ddc30dfed06de24b65179dd71f4
UUSEE Active-X control versions prior to 6.11.0412.1 suffer from a buffer overflow vulnerability.
54895eb20e76a0d758b4761fadf5ef0ce1eaa2272b115e638ff8ff6bbc423c40
Technote version 7.2 suffers from a remote blind SQL injection vulnerability.
eca89a056b553f5b0a8b3d21d90f30c943d29b00196c0152729ffb574df3d910
Trend Micro Data Loss Prevention Virtual Appliance version 5.5 suffers from a remote directory traversal vulnerability.
9e4a683965cc8e8df30b8f761a331a5cb92c21cc6bfd6e2ec457aa0f2caf65d1
WordPress Events Manager extended plugin version 3.1.2 suffers from a remote SQL injection vulnerability.
620dcc51709a14cf0609f24ed3f50f5df802728450736a35660ef91cdcc35c70
A session sidejacking vulnerability was discovered in Facebook.com.
bcc25af3b4d2a9b982d291a0c3015426529c07e1efcd9a3b78e50df28c2aacbf
SUBRION CMS suffers from cross site scripting and remote SQL injection vulnerabilities. The SQL injection vulnerability allows for authentication bypass.
8c186f922813e3df3db5eff7762fb3b9139b8602c1fc0c5f1d7485e04e7bb720
This Metasploit module exploits a stack based buffer overflow in the way IBM Tivoli Endpoint Manager versions 3.7.1, 4.1, 4.1.1, 4.3.1 handles long POST query arguments. This issue can be triggered by sending a specially crafted HTTP POST request to the service (lcfd.exe) listening on TCP port 9495. To trigger this issue authorization is required. This exploit makes use of a second vulnerability, a hardcoded account (tivoli/boss) is used to bypass the authorization restriction.
e26c45a50f92baafd2fb68a99ebdaa1c0b4d55454982b873642bcb3d0f2a41d7
Secunia Security Advisory - Multiple vulnerabilities have been reported in Symantec Mail Security, which can be exploited by malicious people to compromise a vulnerable system.
b408862f48c9056540f454321e2931c9176c29de9c40f2623de4f53f8fd52fdc
Secunia Security Advisory - Szymon Gruszecki has discovered a vulnerability in JW Player, which can be exploited by malicious people to conduct cross-site scripting attacks.
2fbcce8fa6de5d41c4cfe04c59b0ed432021495aea8bffdcc6c9b6013702cc5c
Secunia Security Advisory - Some vulnerabilities have been reported in Movable Type, which can be exploited by malicious people to disclose potentially sensitive information and manipulate certain data.
bee380f78ce5d00efa8e4c671d1c48a75155f62eeef63b4746e871e8ad209a1b
Secunia Security Advisory - Ubuntu has issued an update for the kernel. This fixes multiple weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose certain system and potentially sensitive information, cause a DoS (Denial of Service), and potentially gain escalated privileges and by malicious people with physical access to cause a DoS and potentially compromise a vulnerable system.
d745470c8d9cd55b71d31b8f8a1cc4b62116a6f5db71224e71c66bb436f2469e