iScanner is a free open source tool written in Ruby that lets you detect and remove malicious code from webpages. iScanner will not only show you the infected files in your server but it is also able to clean these files by removing the malware code ONLY from the infected files.
2e0f5f3a1ea22c706232afdde1222ab65dd65fefcc33347fb4275ac6bf190c68
RSA Authentication Agent 7.0 for Web suffers from a directory traversal vulnerability.
934589575348733dd39f775489b9c5364ec05e0b4000995c95d8c6376dde186a
Cisco Security Advisory - Cisco Unified Communications Manager contains two denial of service (DoS) vulnerabilities that affect the processing of Session Initiation Protocol (SIP) messages. Exploitation of these vulnerabilities could cause an interruption of voice services.
c3fdd4bfdc98d4b73e1303adb3d6360884ba21185d10df673c685be2da65da6e
Cisco Security Advisory - The H.323 implementation in Cisco IOS Software contains two vulnerabilities that may be exploited remotely to cause a denial of service (DoS) condition on a device that is running a vulnerable version of Cisco IOS Software.
cd6676ce89b7fde84809979ac8696f4a48adf2841c277e63714ee2a4d4c957ff
Cisco Security Advisory - The Cisco IOS Software Network Address Translation functionality contains three denial of service (DoS) vulnerabilities. The first vulnerability is in the translation of Session Initiation Protocol (SIP) packets, the second vulnerability in the translation of H.323 packets and the third vulnerability is in the translation of H.225.0 call signaling for H.323 packets.
e6c20094360f734ff721bc0af65e94f51c2f6f2742b81fb82c241e98bbd3b36b
Cisco Security Advisory - Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS Software that could allow an unauthenticated, remote attacker to cause a reload of an affected device when SIP operation is enabled.
e5462d0b18f2444ab981aa51f87663bf58f132014c924760a89561d9e29a5e22
VideoCharge Studio suffers from a DLL hijacking vulnerability.
37590696ac067d0b8c983ea90091d4311e2e92b4d4029826c7dcfeb4625efe03
Cisco Security Advisory - A vulnerability in the Internet Group Management Protocol (IGMP) version 3 implementation of Cisco IOS Software and Cisco IOS XE Software allows a remote unauthenticated attacker to cause a reload of an affected device. Repeated attempts to exploit this vulnerability could result in a sustained denial of service (DoS) condition.
f48ba529b3b5b5f7c4da4f4cf3deb8c5e935fb22df7cc9017becc78f344abab0
Cisco Security Advisory - Cisco IOS Software contains a vulnerability when the Cisco IOS SSL VPN feature is configured with an HTTP redirect. Exploitation could allow a remote, unauthenticated user to cause a memory leak on the affected devices, that could result in a memory exhaustion condition that may cause device reloads, the inability to service new TCP connections, and other denial of service (DoS) conditions.
637d8d7da43211cb6cb4b208bbb7f00d36f9f429dcd10df56041d7d697d23758
MP3 Workstation version 9.2.1.1.2 SEH exploit to be used with the Metasploit Framework.
622f79cde70b2703c1f8ac11a7b0438b8e3169877deded2403f12cacb6deed23
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
00bf253e466cffc655f3de6e5ea9f82b2b34c83ce9d5331ce8dfb9e8694e23a5
ipt_pkd is an iptables extension implementing port knock detection. This project provides 3 parts: the kernel module ipt_pkd, the iptables user space module libipt_pkd.so, and a user space client knock program. For the knock packet, it uses a UDP packet sent to a random port that contains a SHA-256 of a timestamp, small header, random bytes, and a shared key. ipt_pkd checks the time window of the packet and does the SHA-256 to verify the packet. The shared key is never sent.
b87c25f185134db50f133771e0401fa05789e49cc0f58fffb7672f4e6066c70e
GreenBrowser DLL hijacking exploit.
d54eb4daf2dc8c8cf8647eeb6c4207b9dacdd05122f4faf0ebc994baf366af03
Whitepaper called Binary Analysis. Written in Turkish.
62485d87cbd499797d8d71cf907c2be530782f370c262dc3e83f3e48d8aed698
The Joomla EZ Autos component suffers from a remote SQL injection vulnerability.
d2c91c270344c506f3e25e3f71430665b82d14138c4e5a8918befc275bc15e8b
The Joomla TimeTrack component version 1.2.4 suffers from multiple remote SQL injection vulnerabilities.
312194bdd4fc8b00e7024dfe80c3ad21693cb8a56daa50655ec4c3ee2134f399
Month Of Abysssec Undisclosed Bugs - Adobe Shockwave Director suffers from a tSAC Chunk memory corruption vulnerability.
ced57ebaada34cf4eedbeb7b75ff1d8d9a0a559814a00a6fd280fb114a190e7d
Month Of Abysssec Undisclosed Bugs - Adobe Shockwave Director suffers from a tSAC Chunk memory corruption vulnerability.
cfed80acab1852e1bb402c1bfba8bb492b562d6271a0ca9214fd4361e41ae355
BSI Hotel Booking System suffers from a remote SQL injection vulnerability that allows for authentication bypass.
9293cd6ce69e843e7ae3c17087b86b5c67ec9a4c5f129ed35fd6478d55b767b4
SEasyOfficeRecovery DLL hijacking exploit.
5cb0358b6cb9855483b146d9c50967af358c7ba87d29e58b8bc893c30e4deb2a
Sothink SWD Decompiler DLL hijacking exploit.
99f45a308c107cde1f5b744e3eb8e1243a3c2acec38d6994183797c4ae38fed2
Joomla version 1.5.x suffers from a cross site request forgery vulnerability.
903b9fa01764e1caf82e7d2da59ca874a54b55131b5d3006d476044aeb34b36d
CONFidence 2.0 2010 Call For Papers - The 8th edition of the international IT security conference, CONFidence 2010, is taking place in November 29/30, 2010, Prague, Czech Republic.
8092197ffe8b9a7d57368bd06b5671452c18c01b8bb1fc579cec91dedb67da4f
Month Of Abysssec Undisclosed Bugs - Gaus CMS version 1.0 suffers from information disclosure and cross site request forgery vulnerabilities.
738e88441b2a52c7f79e5256dade3aba1d85e8e0d2fe3a51690831b40f71614e
Month Of Abysssec Undisclosed Bugs - Gaus CMS version 1.0 suffers from information disclosure and cross site request forgery vulnerabilities.
1cfbaf5b4134648ceef884bae938c41ca9c2aa51e47a794126ac448f26f98f6c