Lucene search

K

America's Army Security Vulnerabilities

zdt
zdt

Imageview <= 6.x Multiple Remote Vulnerabilities

Exploit for php platform in category web...

7.1AI Score

2010-10-11 12:00 AM
11
threatpost
threatpost

All Eyes On Stuxnet At Annual Virus Researcher Summit

The world will know more about the mysterious Stuxnet virus by week’s end, after top virus researchers reveal the findings of their post mortem on Stuxnet at the annual Virus Bulletin Conference. HED: All eyes on Stuxnet at annual virus researcher summit DEK: Researchers will reveal new details...

0.1AI Score

2010-09-29 03:30 PM
5
threatpost
threatpost

Thumb Drive Attack in 2008 Compromised Classified U.S. Networks

A senior official at the Department of Defense is talking publicly about a 2008 security breach that he claims compromised classified intelligence networks used by the U.S. military. Classified networks used by the U.S. military were the target of a successful attack by a foreign nation in 2008,...

AI Score

2010-08-26 03:04 PM
4
packetstorm

0.1AI Score

2010-07-23 12:00 AM
16
packetstorm

-0.3AI Score

2010-07-23 12:00 AM
23
zdt
zdt

phpBazar admin Information Disclosure Vulnerability

Exploit for php platform in category web...

7.1AI Score

2010-07-22 12:00 AM
10
exploitdb

7.4AI Score

2010-07-22 12:00 AM
21
exploitpack
exploitpack

phpBazar Admin - Information Disclosure

phpBazar Admin - Information...

-0.2AI Score

2010-07-22 12:00 AM
8
threatpost
threatpost

This Week In Security: Black Hat, Spammers and Trusted Rootkits

The old saying that there’s nothing new under the sun is just as true in the security industry as it is anywhere else. Many new attacks are variants or tweaks of existing ones, new software fails in exactly the same way as old software and new technologies crop up to solve problems that are 30...

0.4AI Score

2010-07-16 03:54 PM
6
threatpost
threatpost

Caleb Sima on Armorize's Black Hat Talk Being Pulled

Dennis Fisher talks with Caleb Sima of Armorize about the company’s scheduled talk at Black Hat on China’s cyber army being canceled under pressure from the governments of China and Taiwan. Talk on Chinese Cyber Army Pulled From Black Hat *Podcast audio courtesy of sykboy65 Subscribe to the...

0.6AI Score

2010-07-15 06:16 PM
9
threatpost
threatpost

Talk on Chinese Cyber Army Pulled From Black Hat

A talk on China’s state-sponsored offensive security efforts scheduled for the Black Hat conference later this month has been pulled from the conference after concerns were raised by some people within the Chinese and Taiwanese government about the talk’s content. The presentation was to be...

0.4AI Score

2010-07-15 02:13 PM
5
xssed
xssed

Unfixed XSS vulnerability at portalwombat.ru

Security researcher Aras cyber Army, has submitted on 14/07/2010 a cross-site-scripting (XSS) vulnerability affecting portalwombat.ru, which at the time of submission ranked 0 on the web according to Alexa. We manually validated and published a mirror of this vulnerability on 13/12/2011. It is...

AI Score

2010-07-14 12:00 AM
6
zdt
zdt

Sphider admin panel path disclosure authentication by pass

Exploit for php platform in category web...

7.1AI Score

2010-07-04 12:00 AM
63
zdt
zdt

BROWSE CD SQL injection Vulnerability

Exploit for php platform in category web...

7.1AI Score

2010-06-29 12:00 AM
44
packetstorm

0.4AI Score

2010-06-25 12:00 AM
27
zdt
zdt

Axis IT Group SQL Injection Vulnerability

Exploit for php platform in category web...

7.1AI Score

2010-06-23 12:00 AM
11
zdt
zdt

QuiXplorer Shell upload Vulnerability

Exploit for php platform in category web...

7.1AI Score

2010-06-16 12:00 AM
28
zdt
zdt

Read local Config File source (webadmin.php) Vulnerability

Exploit for php platform in category web...

7.1AI Score

2010-06-15 12:00 AM
19
zdt
zdt

Netsniper SQL Injection Vulnerability

Exploit for php platform in category web...

7.1AI Score

2010-06-14 12:00 AM
17
securityvulns
securityvulns

Microsoft Windows Help Centre Handles Malformed Escape Sequences Incorrectly

Microsoft Windows Help Centre Handles Malformed Escape Sequences Incorrectly Help and Support Centre is the default application provided to access online documentation for Microsoft Windows. Microsoft supports accessing help documents directly via URLs by installing a protocol handler for the...

-0.1AI Score

2010-06-14 12:00 AM
25
seebug

7.1AI Score

2010-06-10 12:00 AM
28
exploitpack
exploitpack

Microsoft Windows Help Centre Handles - Malformed Escape Sequences Incorrectly (MS03-044)

Microsoft Windows Help Centre Handles - Malformed Escape Sequences Incorrectly...

-0.2AI Score

2010-06-10 12:00 AM
27
threatpost
threatpost

Software Insecurity is Our Biggest Weakness

ST. PAUL, MINN.–If the United States wants to remain competitive in the global economy and prevent widespread penetrations of its strategic, corporate and commercial networks, enterprises and government agencies should stop relying on commercial software and go back to writing more of their own...

0.5AI Score

2010-05-12 01:31 PM
3
zdt
zdt

Liquid XML Studio 2010 <= v8.061970 - OpenFile() Remote Heap Overflow

Exploit for unknown platform in category remote...

7.1AI Score

2010-03-15 12:00 AM
22
exploitpack
exploitpack

Liquid XML Studio 2010 8.061970 - LtXmlComHelp8.dll OpenFile() Remote Overflow

Liquid XML Studio 2010 8.061970 - LtXmlComHelp8.dll OpenFile() Remote...

0.3AI Score

2010-03-15 12:00 AM
24
packetstorm

0.5AI Score

2010-03-15 12:00 AM
17
threatpost
threatpost

Is That a Bot In Your Pocket? Or Does It Just Look Like One?

Last week at the RSA Conference, my colleague Derek Brown and I, presented findings from a research project titled MOBOTS: Pocketful of Pwnage, which was designed to show how easy it would be to create a large mobile botnet. Please note that we did not actually create a botnet; we simply presented....

-0.2AI Score

2010-03-11 03:38 PM
2
threatpost
threatpost

An Interview With Howard Schmidt

Howard Schmidt has been involved in just about every aspect of the security industry during his career. After stints in the Air Force and at Microsoft, he served as a cybersecurity adviser to George W. Bush. Now, after heading back to the private sector for several years, he’s been appointed to...

-0.5AI Score

2010-02-22 04:50 PM
6
threatpost
threatpost

House Passes Cybersecurity Bill

The House today overwhelmingly passed a bill aimed at building up the United States’ cybersecurity army and expertise, amid growing alarm over the country’s vulnerability online. Read the full story [New York...

2.1AI Score

2010-02-04 07:46 PM
4
threatpost
threatpost

'Iranian Cyber Army' Takes Down China's Baidu

The group that took down Twitter.com last month has apparently claimed another victim: China’s largest search engine Baidu.com. Read the full article....

2.2AI Score

2010-01-12 02:28 PM
2
threatpost
threatpost

Twitter Outage A DNS Hack

Microblogging site Twitter went offline for a while Friday after hackers calling themselves the Iranian Cyber Army apparently managed to change DNS records, redirecting traffic to another Web page. Read the full article....

3.1AI Score

2009-12-18 03:26 PM
4
threatpost
threatpost

Q&A: Eugene Spafford on Cybercrime, Security Research

Threatpost editor Dennis Fisher talks with Eugene Spafford of Purdue’s CERIAS center about cybercrime, funding for long-term security research projects and whether the federal cybersecurity coordinator position matters. Fisher: Do you see any indications that there will be more funding coming from....

-0.8AI Score

2009-12-14 03:26 PM
6
threatpost
threatpost

The Root of the Botnet Epidemic

Over the course of a few days in February 2000, a lone hacker was able to bring some of the Web’s larger sites to their knees, using just a few dozen machines and some relatively primitive software to cripple Yahoo, eBay, E*trade, Amazon, ZDnet and others for hours at a time. No one knew it at the....

-0.3AI Score

2009-11-30 12:38 PM
23
threatpost
threatpost

Ants vs. Worms: Computer Security Mimics Nature

In the never-ending battle to protect computer networks from intruders, security experts are deploying a new defense modeled after one of nature’s hardiest creatures — the ant. Unlike traditional security devices, which are static, these “digital ants” wander through computer networks looking for.....

1.5AI Score

2009-09-29 07:28 AM
10
myhack58
myhack58

“Broiler”get the insider Secret's to exploit system vulnerabilities-vulnerability warning-the black bar safety net

It has been, by a large number of“broiler”is composed of the zombiesweb, all the time not a threat to all web users safe.“ Chicken”, refers to those who are the attacker full control of a computer network, it is the composition of the botnet of the main factors. Therefore, in order to eliminate...

0.2AI Score

2009-07-21 12:00 AM
7
packetstorm

0.3AI Score

2009-07-14 12:00 AM
13
exploitpack
exploitpack

Americas Army 3.0.4 - Invalid Query Remote Denial of Service

Americas Army 3.0.4 - Invalid Query Remote Denial of...

0.8AI Score

2009-06-06 12:00 AM
4
exploitdb

7.4AI Score

2009-06-06 12:00 AM
12
threatpost
threatpost

The cybersecurity mess on the White House front steps

If President Obama thinks fixing the broken U.S. economy is a challenge, and ending the ground wars in the Middle East a conundrum, wait until he gets around to tackling cybersecurity. Obama must reverse the abject lack of any sort of meaningful coordinated defense against intensifying and...

-0.4AI Score

2009-03-16 02:55 PM
6
myhack58
myhack58

Analyze page Trojan how to encrypt code to evade kill-vulnerability warning-the black bar safety net

As the web hang horse popular, the virus also began to keep tabs on various web hang horse way, this let many hackers very annoyed. But hackers soon found a coping method, this method iswill hang horse web page code to be encrypted, disrupting the original code looks like, let the antivirus...

-0.4AI Score

2009-03-13 12:00 AM
8
openvas
openvas

Fedora Update for wesnoth FEDORA-2007-2496

Check for the Version of...

-0.3AI Score

0.029EPSS

2009-02-27 12:00 AM
7
openvas
openvas

Fedora Update for wesnoth FEDORA-2007-3989

Check for the Version of...

-0.3AI Score

0.019EPSS

2009-02-27 12:00 AM
7
openvas
openvas

Fedora Update for wesnoth FEDORA-2007-3986

Check for the Version of...

-0.3AI Score

0.029EPSS

2009-02-27 12:00 AM
6
securityvulns
securityvulns

Failed assertion in the Unreal engine

Luigi Auriemma Application: Unreal engine http://www.unrealtechnology.com Versions: the games which have been tested and resulted vulnerable are Unreal Tournament 3 1.3, Unreal Tournament 2003 and 2004, Dead Man's Hand, Pariah, WarPath, Postal2,...

AI Score

2008-09-16 12:00 AM
19
nvd
nvd

CVE-2008-3492

America's Army (aka AA or Army Game Project) 2.8.3.1 and earlier allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted UDP packet, probably involving a VoiceIndex value that is outside of the range specified by...

6.6AI Score

0.017EPSS

2008-08-06 06:41 PM
prion
prion

Design/Logic Flaw

America's Army (aka AA or Army Game Project) 2.8.3.1 and earlier allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted UDP packet, probably involving a VoiceIndex value that is outside of the range specified by...

7.2AI Score

0.017EPSS

2008-08-06 06:41 PM
4
cve
cve

CVE-2008-3492

America's Army (aka AA or Army Game Project) 2.8.3.1 and earlier allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted UDP packet, probably involving a VoiceIndex value that is outside of the range specified by...

6.7AI Score

0.017EPSS

2008-08-06 06:41 PM
18
Total number of security vulnerabilities2063