an

Cisco Email Security Virtual Appliance C100V IronPort Header Injection

Cisco Email Security Virtual Appliance C100V IronPort remote host header injection exploit.




an

Cisco C690 Email Security Appliance 11.0.2-044 IronPort Header Injection

Cisco C690 Email Security Appliance version 11.0.2-044 IronPort remote host header injection exploit.




an

Cisco Email Security Virtual Appliance C600V IronPort Header Injection

Cisco Email Security Virtual Appliance C600V IronPort remote host header injection exploit.




an

Cisco Email Security Virtual Appliance C370 IronPort Header Injection

Cisco Email Security Virtual Appliance C370 IronPort remote host header injection exploit.




an

Cisco Content Security Management Virtual Appliance M600V IronPort Header Injection

Cisco Content Security Management Virtual Appliance M600V IronPort remote host header injection exploit.




an

Cisco Email Security Virtual Appliance C300V IronPort Header Injection

Cisco Email Security Virtual Appliance C300V IronPort remote host header injection exploit.




an

Cisco Email Security Virtual Appliance C380 IronPort Header Injection

Cisco Email Security Virtual Appliance C380 IronPort remote host header injection exploit.




an

Cisco Content Security Virtual Appliance M380 IronPort Remote Cross Site Host Modification

Cisco Content Security Virtual Appliance M380 IronPort remote cross site host modification demo exploit.




an

Debian Security Advisory 4535-1

Debian Linux Security Advisory 4535-1 - Lilith of Cisco Talos discovered a buffer overflow flaw in the quota code used by e2fsck from the ext2/ext3/ext4 file system utilities. Running e2fsck on a malformed file system can result in the execution of arbitrary code.




an

Debian Security Advisory 4607-1

Debian Linux Security Advisory 4607-1 - Lukas Kupczyk reported a vulnerability in the handling of chunked HTTP in openconnect, an open client for Cisco AnyConnect, Pulse and GlobalProtect VPN. A malicious HTTP server (after having accepted its identity certificate), can provide bogus chunk lengths for chunked HTTP encoding and cause a heap-based buffer overflow.




an

Cisco Data Center Network Manager 11.2 Remote Code Execution

Cisco Data Center Network Manager version 11.2 remote code execution exploit.




an

Cisco Data Center Network Manager 11.2.1 SQL Injection

Cisco Data Center Network Manager version 11.2.1 suffers from a remote SQL injection vulnerability.




an

Cisco Data Center Network Manager 11.2.1 Command Injection

Cisco Data Center Network Manager version 11.2.1 remote command injection exploit.




an

Cisco AnyConnect Secure Mobility Client 4.8.01090 Privilege Escalation

Cisco AnyConnect Secure Mobility Client for Windows version 4.8.01090 suffer from a privilege escalation vulnerability due to insecure handling of path names.




an

Debian Security Advisory 4367-2

Debian Linux Security Advisory 4367-2 - The Qualys Research Labs reported that the backported security fixes shipped in DSA 4367-1 contained a memory leak in systemd-journald. This and an unrelated bug in systemd-coredump are corrected in this update.




an

Nanometrics Centaur / TitanSMA Unauthenticated Remote Memory Leak

An information disclosure vulnerability exists when Centaur and TitanSMA fail to properly protect critical system logs such as 'syslog'. Additionally, the implemented Jetty version (9.4.z-SNAPSHOT) suffers from a memory leak of shared buffers that was (supposedly) patched in Jetty version 9.2.9.v20150224.




an

Nanometrics Centaur 4.3.23 Memory Leak

Nanometrics Centaur version 4.3.23 suffers from an unauthenticated remote memory leak vulnerability.




an

Irix LPD tagprinter Command Execution

This Metasploit module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Irix.




an

Malware Analysis Part I

Malware Analysis Part I - This guide is the first part of a series of three where we begin with setting up the very foundation of a analysis environment; the analysis station. It will give the reader a quick recap in the different phases of malware analysis along with a few examples. It will then guide the reader in how to build an analysis station optimized for these phases. Along with this, the guide also introduces a workflow that will give the reader a good kick-start in performing malware analysis on a professional basis, not only on a technical level.




an

COVID-19 Malware Wipes Your PC And Rewrites Your MBR





an

TBA_Handbook.doc

Documentation for TBA, the first wardialer for the PalmOS platform. In Microsoft Word format.





an

Dridex Trojan Updated With AtomBombing Evasion Techniques













an

NanoCore Trojan Is Protected In Memory From Being Killed Off












an

Bull / IBM AIX Clusterwatch / Watchware File Write / Command Injection

Bull / IBM AIX Clusterwatch / Watchware suffers from having trivial admin credentials, system file writes, and OS command injection vulnerabilities.










an

Debian Security Advisory 4181-1

Debian Linux Security Advisory 4181-1 - Andrea Basile discovered that the 'archive' plugin in roundcube, a skinnable AJAX based webmail solution for IMAP servers, does not properly sanitize a user-controlled parameter, allowing a remote attacker to inject arbitrary IMAP commands and perform malicious actions.