WebKitGTK+ and WPE WebKit suffer from multiple memory corruption vulnerabilities that can lead to code execution. Multiple versions are affected.
3cb5fdcd6bc0ec5fd603824f6ca990d828d8b0a217586bb8ab36b7bb300e82c5
Malheur is a tool for automatic analysis of program behavior recorded from malicious software (malware). It is designed to support the regular analysis of malicious software and the development of detection and defense measures. It allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes. It can be applied to recorded program behavior of various formats as long as monitored events are separated by delimiter symbols, e.g. as in reports generated by the popular malware sandboxes CWSandbox, Anubis, Norman Sandbox, and Joebox.
b23a4c2300216b322fc2b40a1624a3b7d197ae9f6f944b0f4fb13625af635734
Malheur is a tool for automatic analysis of program behavior recorded from malicious software (malware). It is designed to support the regular analysis of malicious software and the development of detection and defense measures. It allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes. It can be applied to recorded program behavior of various formats as long as monitored events are separated by delimiter symbols, e.g. as in reports generated by the popular malware sandboxes CWSandbox, Anubis, Norman Sandbox, and Joebox.
3be1c2c3ddf9fa21e38ce94750996f036a69b033f1baf6d76c0a960a040fd74e
Web Statistics and Analysis CMS suffers from a remote SQL injection vulnerability.
5cbb613c88249baa23fabcca52ea445779c42f9e2bd6d5bdec8bbaa8ca8d9061
Malheur is a tool for automatic analysis of program behavior recorded from malicious software (malware). It is designed to support the regular analysis of malicious software and the development of detection and defense measures. It allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes. It can be applied to recorded program behavior of various formats as long as monitored events are separated by delimiter symbols, e.g. as in reports generated by the popular malware sandboxes CWSandbox, Anubis, Norman Sandbox, and Joebox.
df152eb282e18a93d369d9d2a4b5080144ecc1e024ca75649e2b5307ca065711
Malheur is a tool for automatic analysis of program behavior recorded from malicious software (malware). It is designed to support the regular analysis of malicious software and the development of detection and defense measures. It allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes. It can be applied to recorded program behavior of various formats as long as monitored events are separated by delimiter symbols, e.g. as in reports generated by the popular malware sandboxes CWSandbox, Anubis, Norman Sandbox, and Joebox.
f09e067a8a31743143add874ffdc7a4a5fd2f078cf7808c58fd8f79c9bd497d4
Malheur is a tool for automatic analysis of program behavior recorded from malicious software (malware). It is designed to support the regular analysis of malicious software and the development of detection and defense measures. It allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes. It can be applied to recorded program behavior of various formats as long as monitored events are separated by delimiter symbols, e.g. as in reports generated by the popular malware sandboxes CWSandbox, Anubis, Norman Sandbox, and Joebox.
3530dccb3a426ab47e5db7746ea79e98d8e57353d7b1e19c0cba6da526dd3bc6
Malheur is a tool for automatic analysis of program behavior recorded from malicious software (malware). It is designed to support the regular analysis of malicious software and the development of detection and defense measures. It allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes. It can be applied to recorded program behavior of various formats as long as monitored events are separated by delimiter symbols, e.g. as in reports generated by the popular malware sandboxes CWSandbox, Anubis, Norman Sandbox, and Joebox.
34da6bbc102ec549b6563c26b7f089d8f10c631825aacf6478c54cae6e058c02
This Metasploit module exploits a stack overflow in AtHocGov IWSAlerts. When sending an overly long string to the CompleteInstallation() method of AtHocGovTBr.dll (6.1.4.36) an attacker may be able to execute arbitrary code. This vulnerability was silently patched by the vendor.
3be437f260772dff9eaa53d584553434d04c820e8403f838ccbefca9b4d9967c
Feindt Computerservice News version 2.0 suffers from a remote file inclusion vulnerability in newsadmin.php.
903de33b808e2218d2f4487275559f24857053e7f13987da590057403321c2c7
Secunia Security Advisory - Aliaksandr Hartsuyeu has discovered a vulnerability in Newsadmin, which can be exploited by malicious people to conduct SQL injection attacks.
2c3b716d4c3ebe0cb441663c4b7c09d494fdb925b0383c343c3d537c0fa5a09b
Fwsa.sh is a tool to penetration test Checkpoint Firewall-1 remotely which implements the recently published holes in session authentication. It attempts to recover user passwords, execute dos attacks, and brute force the firewall managment password.
15cc194a3f036e1dad933df40241526b6339084858b3fcaa488cf404942dcee7