Debian Linux Security Advisory 2371-1 - Two buffer overflows were discovered in JasPer, a library for handling JPEG-2000 images, which could lead to the execution of arbitrary code.
378ae0ceefe4816301fc1cbd5602b9554680c22218691bc93c90385f418234a7
Whitepaper called Hardware Involved Software Attacks. Computer security vulnerabilities involving hardware are under-represented within the security industry. With a growing number of attackers, malware, and researchers moving beyond pure software attack scenarios and into scenarios incorporating a hardware element, it is important to start laying a foundation on how to understand, characterize, and defend against these types of hybrid attacks. This paper introduces and details a starting taxonomy of security attacks called hardware involved software attacks, in an effort to further security community awareness of hardware security and its role in upholding the security of the PC platform.
c7725f5f5155ccae730b5464c6855db0d3283f354981f52fcebb60c92127731a
Microsoft Windows Media Player version 11.0.5721.5262 remote denial of service exploit.
8f956aea0456c97de55561f1b85fde6e2d17e46339271b02a273569d29f09677
Putty version 0.60 null pointer denial of service exploit.
c0e5d6fed8a39f92e5fe93389c056c8233af29be9277250b0220f8dccc1f7f2e
MySQL version 5.5.8 remote denial of service proof of concept exploit.
e47dc3eb176f47a4d695cb60327c8ceca93506e42b7b61b174b504ddbbd485fd
FreeSSHD remote denial of service proof of concept exploit.
64ef29a432819a28b41d8f37b7d65cc811d1a982933c6caf1642e4ced0608e7a
Pre Studio Business Card Designer suffers from a remote SQL injection vulnerability.
c794f54bab399b0c0633492d18f99b818df6ffbe8246ade34257f886b2c02046
D-Zayn Web Design Access suffers from a remote SQL injection vulnerability.
a1ae391f129cbd6c64b9a123df61a7dcf6e5f853e2420e8d50108ee26be570cb
Whitepaper called Construindo Shellcodes. It discusses how to build shellcodes and use them. Written in Portuguese.
8a69b4c29cd9e658b54a12c337266f622bc5a9644d51ae9a62cf454b59fa26b1
GraphicClone suffers from a cross site scripting vulnerability.
7e386b1f62fdf95ab4f2156dbfe331cae9df9200886e6339cdf26aab4295c59f