This paper examines network layer security provided by IPSec and link layer security provided by WPA, addressing the characteristics of each approach when applied to wireless networks. It also discusses types of attack done on Wireless/Wi-Fi and security mitigations.
30f079292e126b6757e81232dfdb4f5e11ee01e8b0b8be39876b06cf34a9f6ae
Adobe Photoshop Elements 8 suffers from a buffer overflow vulnerability when dealing with .ABR (brushes) and .GRD (gradients) format files. The application fails to sanitize the user input resulting in a memory corruption, overwriting several memory registers which can aid the attacker to gain the power of executing arbitrary code on the affected system or denial of service scenario.
de231a932c681e757853f9b30b26ba630e5371c0793ff22cac8c46c88a5791d2
Whitepaper called JBoss Exploitation. This paper goes into detail on popping a shell on open JMX consoles.
f5e7c9eba0269b878c2481d4055fb0247eb60c34c16d6a88ef2dd33026039dc3
ezCourses suffers from a remote permission bypass vulnerability.
cfffe26e8a2c8163ffb3a958da99afbf0c798ccc10fa5168c9e40db57b4e1dea
Knull Shell Alpha1 is a PHP shell that has bind, reverse, and backpipe shells.
ad77bcbd30f3d90fdb9ea4fa2d171918170d050e6362eb389985fee2e78fd1ef
Subsembly Banking version 3.1.x suffers from input validation vulnerabilities that allow for database manipulation.
996eff32baea61a1ede82beeeae2c83e9c6b92dca3ada3843059c36bbc758a5b
Whitepaper called Bypassing ASLR/DEP. It discusses techniques to bypass these security mechanisms and how custom shellcodes are developed.
19d0d0eeefb330797d6b704b3e34af8e0a45d1f512f2906ecc92ca8068e83e5d
BitDefender Total Internet Security 2011 suffers from a buffer overflow vulnerability.
dca9c1a23d348f7b802186da9fb1a8652647d74e2aa37ca25e752031aa40663f
Elastix PBX suffers from an extension enumeration vulnerability.
55d17d5b186355b3e0e5d0079ca0909b3e7d453109f9bae233328a8e7712d0e0
StarMoney Banking Software version 8.0 suffers from multiple input validation vulnerabilities that can lead to session hijacking, javascript insertion, and more.
5945bbbf9c35fac8eeb33e8bbf0d1cbedb2ab8c71ca44e5a6dd772e1513c460c
SPIP suffers from path disclosure and remote SQL injection vulnerabilities.
c5ec4f4dc665c1bcb44ae29ca93daddf8a426574d987114ec133f714bb184766