ust

Mythbusters RFID Episode Axed After Pressure From Credit Card Firms




ust

European Commission Launches New Industry Guidelines On RFID Privacy




ust

Avaya IP Office Customer Call Reporter Command Execution

This Metasploit module exploits an authentication bypass vulnerability on Avaya IP Office Customer Call Reporter, which allows a remote user to upload arbitrary files through the ImageUpload.ashx component. It can be abused to upload and execute arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2.









ust

IBM Warns Of Malware On USB Drives Shipped To Customers






ust

Lulzbuster 1.0.0

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.




ust

Lulzbuster 1.1.0

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.




ust

Lulzbuster 1.2.0

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.




ust

Lulzbuster 1.3.2

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.






ust

Scam Call Center Owner In Custody After BBC Investigation




ust

Google's Bug Bounty Program Just Had A Record-Breaking Year Of Payouts





ust

Cisco Warns Customers Of Critical Flaws, Including Struts




ust

What Would Happen If The Whole Internet Just Shutdown All Of A Sudden?




ust

Hospitals Must Secure Vital Backend Networks Before It's Too Late







ust

Hackers Busted In Online Poker Cheats









ust

Gold Galleon Hackers Target Maritime Shipping Industry




ust

Reminder: We're Still Bad At Securing Industrial Controllers




ust

Half Of Industrial Control System Networks Have Faced Cyber Attacks, Say Security Researchers






ust

Exploiting CAN-Bus Using Instrument Cluster Simulator

Whitepaper called Exploiting CAN-Bus using Instrument Cluster Simulator.




ust

Bull / IBM AIX Clusterwatch / Watchware File Write / Command Injection

Bull / IBM AIX Clusterwatch / Watchware suffers from having trivial admin credentials, system file writes, and OS command injection vulnerabilities.