what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files

WOOT 11 Call For Papers
Posted Feb 3, 2011
Site usenix.org

WOOT '11 Call For Papers - This will be held August 8th through the 9th, 2011, in San Francisco, CA. WOOT '11 is co-located with the 20th USENIX Security Symposium (USENIX Security '11), which will take place August 10th through the 12th, 2011.

tags | paper, conference
SHA-256 | 165d18aec7757220c2eb237ad9a6e63de84f0aa51c00170410040415c51b8f11

Related Files

WOOT 12 Call For Papers
Posted Apr 11, 2018
Site usenix.org

WOOT '12 Call For Papers - This will be held August 13th through the 14th, 2018, in Baltimore, MD, USA. WOOT '12 is co-located with the USENIX Security Symposium.

tags | paper, conference
SHA-256 | 7a74006c1ab85937496c5b696ca8e43fbd7c6c7739c1dd21560137a7160b4b4d
WooThemes WooFramework 4.5.1 Cross Site Scripting
Posted Apr 24, 2015
Authored by Evex

WooThemes WooFramework version 4.5.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5d124409091d48c2939ad588a90764b38d2a4484f4d89a3139fb746c2c995abf
Subverting BIND's SRTT Algorithm: Derandomizing NS Selection
Posted Aug 14, 2013
Authored by Roee Hay, Jonathan Kalechstein, Gabi Nakibly

BIND is exposed to a new vulnerability which can be exploited remotely in order to derandomize the name server selection algorithm. Exploitation of this vulnerability can be used in conjunction with other off-path DNS cache poisoning exploits in order to make them more efficient. ISC has acknowledged the vulnerability and plans to address this deficiency by re-implementing the SRTT algorithm in future maintenance releases of the BIND 9 code. This whitepaper goes into great detail regarding this issue.

tags | advisory
SHA-256 | 84356c82ef3047b3388b1711d4f92e2ade893d39556c93520d7e0953f3faf27f
Secunia Security Advisory 44275
Posted Apr 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two security issues and two vulnerabilities have been reported in WooThemes Bueno, City Guide, Coffee Break, Daily Edition, Delegate, Fresh News, Headlines, Inspire, Optimize, Over Easy, and The Station ExpressionEngine themes, which can be exploited by malicious people to conduct cross-site scripting attacks and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability, xss
SHA-256 | 56adfd5fea63167983051b1869f7693780828dcbb7e2a6893b95bf628381f594
Secunia Security Advisory 44140
Posted Apr 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two security issues and two vulnerabilities have been reported in WooThemes Live Wire and Gazette Edition WordPress themes, which can be exploited by malicious people to conduct cross-site scripting attacks and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability, xss
SHA-256 | 72057db40a756fe535209523780c1e7c91f7b97dec73c31f0a2b8d6ddaa52b2a
WOOT 09 Call For Papers
Posted Apr 28, 2009
Site usenix.org

WOOT '09 Call For Papers - The 3rd USENIX Workshop on Offensive Technologies will be a one-day event Monday, August 10 and will be co-located with the 18th USENIX Security Symposium in Montreal, Canada.

tags | paper, conference
SHA-256 | 5336f61bd62eeb8111088549f2374fb719ce5f0b243964aef99e2ecf62e2b87e
woot07-cfp.txt
Posted May 3, 2007
Site usenix.org

WOOT '07 Call For Papers - The First USENIX Workshop on Offensive Technologies (WOOT) will be held August 6, 2007 in Boston, MA, USA.

tags | paper, conference
SHA-256 | 3629d47e087f7256727ca7e5600e1144b8d83649cc6fe4487b1108deef981177
woot.java
Posted Jul 6, 2002
Authored by electronicsouls, CraigTM | Site es.xor.ru

Wu-ftpd 2.6.[0/1] remote heap overflow written in Java. Provides a remote shell. Includes targets for RedHat 7.0 and wu-2.6.0/1 from www.wu-ftpd.org.

tags | exploit, java, remote, overflow, shell
systems | linux, redhat
SHA-256 | 57929d95896c2d40e1e0a264c95b5e575151758f19e071e54f3d2c1e88fd64df
Page 1 of 1
Back1Next

File Archive:

November 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    16 Files
  • 2
    Nov 2nd
    17 Files
  • 3
    Nov 3rd
    17 Files
  • 4
    Nov 4th
    11 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    3 Files
  • 8
    Nov 8th
    59 Files
  • 9
    Nov 9th
    12 Files
  • 10
    Nov 10th
    6 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    1 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    9 Files
  • 15
    Nov 15th
    33 Files
  • 16
    Nov 16th
    53 Files
  • 17
    Nov 17th
    11 Files
  • 18
    Nov 18th
    14 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    26 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    10 Files
  • 24
    Nov 24th
    9 Files
  • 25
    Nov 25th
    11 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close