
securityvulns.com
Computer Security vulnerabilities and exploits databaseComputer security and information security: advisories, exploits and vulnerabilities database, articles and security news
http://www.securityvulns.com/
Computer security and information security: advisories, exploits and vulnerabilities database, articles and security news
http://www.securityvulns.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Tuesday
LOAD TIME
2.2 seconds
Vladimir V Dubrovin
Vladimir V Dubrovin
Ulyan●●●●●., 46
Nizhn●●●●●gorod , Nizhny Novgorod, 603155
RU
View this contact
Vladimir V Dubrovin
Vladimir V Dubrovin
Ulyan●●●●●., 46
Nizhn●●●●●gorod , Nizhny Novgorod, 603155
RU
View this contact
Vladimir V Dubrovin
Vladimir V Dubrovin
Ulyan●●●●●., 46
Nizhn●●●●●gorod , Nizhny Novgorod, 603155
RU
View this contact
18
YEARS
3
MONTHS
13
DAYS
REGIONAL NETWORK INFORMATION CENTER, JSC DBA RU-CENTER
WHOIS : whois.nic.ru
REFERRED : http://www.nic.ru
PAGES IN
THIS WEBSITE
22
SSL
EXTERNAL LINKS
78
SITE IP
95.79.31.239
LOAD TIME
2.158 sec
SCORE
6.2
Computer Security vulnerabilities and exploits database | securityvulns.com Reviews
https://securityvulns.com
Computer security and information security: advisories, exploits and vulnerabilities database, articles and security news
Search:Vulnerability 01.03.2015-31.03.2015 - security vulnerabilities database
http://securityvulns.com/news01.03.2015-31.03.2015.html
Search:Vulnerability 01.03.2015-31.03.2015. EN] securityvulns.ru no-pyccku. Google Android sandbox bypass. Google App Engine Java sandbox escape. Crossite scripting in conversion to HTML. Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl). PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc. Mozilla Firefox / Thunderbird / Seamonkey multiple security vulnerabilities. Updated since 07.03.2015. Dropbox SDK for Android account spoofing.
Exploits, PoCs and exploits RSS channel - security vulnerabilities database
http://securityvulns.com/exploits
Exploits, PoCs and exploits RSS channel. EN] securityvulns.ru no-pyccku. RSS channel for exploits codes. For vulnerabilities and exploits. PoC exploit search by keyword:. An unusual local root exploit against CVE-2015-3245 userhelper chfn() newline filtering / CVE-2015-3246 libuser passwd file handling. CVE-2014-0196: Linux kernel = v3.15-rc4: raw mode PTY local echo race condition Slightly-less-than-POC privilege escalation exploit For kernels = v3.14-rc1. HP-UX rlpdaemon local exploit. FreeSSHD all ver...
Advertising - Computer security: vulnerabilities and exploits database
http://securityvulns.com/advertising
EN] securityvulns.ru no-pyccku. SecurityVulns is one of leading Russian information security related resources, available in both Russian and English with 50,000 of unique visitors every month, 4000 e-mail news subscribers and thousands RSS newsfeeds subscribers. System administrators and IT security administrators form the majority of Security.NNOV audience. Ad placement variants and prices. Please note, Russian and English versions are located on different sites:. AA - English and Russian, main page ht...
Security Advisory: Microsoft VISTA TCP/IP stack buffer overflow - security vulnerabilities database
http://securityvulns.com/Udocument888.html
Security Advisory: Microsoft VISTA TCP/IP stack buffer overflow. EN] securityvulns.ru no-pyccku. Microsoft Windows Vista memory corruption. Tunterleitner (at) phion.com. Microsoft VISTA TCP/IP stack buffer overflow. Phion Security Advisory 21/10/2008. Microsoft VISTA TCP/IP stack buffer overflow. Microsoft Device IO Control wrapped by the iphlpapi.dll API shipping with Windows Vista 32 bit and. 64 bit contains a possibly exploitable, buffer overflow corrupting kernel memory. DestinationPrefix structure c...
CVE-2009-3720 - Computer security: vulnerabilities and exploits database
http://securityvulns.com/CVE-2009-3720.html
EN] securityvulns.ru no-pyccku. The updatePosition function in lib/xmltok impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625. Assigned (28.09.2011). Http:/ nvd.nist.gov/nvd.cfm? MLIST : [oss-security] 20090821 expat bug 1990430. CONFIRM : http:/ expat....
TOTAL PAGES IN THIS WEBSITE
22
:: KisLinux :: [ linux - personalidade - network - security - hacking and humor ]: Maio 2009
http://kislinux.blogspot.com/2009_05_01_archive.html
Terça-feira, 5 de maio de 2009. Hi all. last week I was logged on msn, when a friend asked me the meaning of the acronym LOL. He noted that whenever that word in conversations and texts, but until then he did not know its meaning, was there that I had the idea of creating a post, showing several examples of acronyms, often used in chats. See the list bel ow and if you have something different from other acronym you can post it as comment. First the terms are better known in Brazil. HL: High Level "Alto N...
Tao Defense: Links
http://t3rm1t.blogspot.com/p/links.html
I want to share my collection of useful links. You can add something new in comments. Multi) http:/ www.subnetonline.com/. Multi) http:/ ping.eu/. Multi) http:/ serversniff.net/. Multi) http:/ www.yougetsignal.com/. Dig/nslookup,whois,traceroute) http:/ networking.ringofsaturn.com/Tools/. Whois,dns tools,service scan,traceroute) http:/ centralops.net/co/DomainDossier.aspx. Whois,dns tools,domain search) http:/ www.whois.ws/. Whois,dns tools) http:/ www.robtex.com/. Http:/ www.exploit-db.com/. Joomla scan...
Ultimate Library of ICS Cyber Security Resources - SCADAhacker
https://scadahacker.com/library/index.html
Think like a hacker. To secure industrial control systems. Library of Resources for. Industrial Control System Cyber Security. ONLINE COURSES NOW AVAILABLE! Register now for introductory pricing! Year in Review ( 2014. Industrial Control Systems Assessments 2014 - Overview and Analysis. Incident Response Summary Report - 2009-2011. Distinguishing Internet-facing ICS Devices using PLC Programming Information. 2015 Cyber Security Report. Common Control System Vulnerabilities (2005). SCADA Safety in Numbers.
Rotimi Akinyele – The Infosec Shinobi
http://rotimiakinyele.com/page/2
Online Penetration Testing Tools. Posted by Infosec Shinobi. Posted in Security Articles. I saw this post on eLearnSecurity and decided to share. I will be updating as time goes on. Multi) http:/ www.subnetonline.com/. Multi) http:/ ping.eu/. Multi) http:/ serversniff.net/. Multi) http:/ www.yougetsignal.com/. Dig/nslookup,whois,traceroute) http:/ networking.ringofsaturn.com/Tools/. Whois,dns tools,domain search) http:/ www.whois.ws/. Whois,dns tools) http:/ www.robtex.com/. Nmap,traceroute,whois) http:/...
Rotimi Akinyele – The Infosec Shinobi » Online Penetration Testing Tools
http://rotimiakinyele.com/online-penetration-testing-tools.jsp
Online Penetration Testing Tools. Posted by Infosec Shinobi. Posted in Security Articles. I saw this post on eLearnSecurity and decided to share. I will be updating as time goes on. Multi) http:/ www.subnetonline.com/. Multi) http:/ ping.eu/. Multi) http:/ serversniff.net/. Multi) http:/ www.yougetsignal.com/. Dig/nslookup,whois,traceroute) http:/ networking.ringofsaturn.com/Tools/. Whois,dns tools,domain search) http:/ www.whois.ws/. Whois,dns tools) http:/ www.robtex.com/. Nmap,traceroute,whois) http:/...
:: KisLinux :: [ linux - personalidade - network - security - hacking and humor ]: Março 2010
http://kislinux.blogspot.com/2010_03_01_archive.html
Segunda-feira, 22 de março de 2010. UBUNTU 9.10 - GNOME COMPIZ FUSION. Durante um bom tempo eu quis ativar a aceleração 3D das versões anteriores do Ubuntu. Mas devido às placas de video que eu utilizava, isso não era possível. Com o passar do tempo, instalei o Ubuntu na sua versão 9.10, o Karmic Koala. E então, consegui enfim ativar os efeitos 3D graças à uma placa de video Intel, era antiga a placa, mas pelo menos a aceleração foi possível. Links para esta postagem. Compartilhar com o Pinterest. Edição...
Реклама - компьютерная безопасность: уязвимости и эксплоиты
https://securityvulns.ru/advertising
RU] switch to English. SecurityVulns является одним из наиболее посещаемых Российских ресурсов посвященных информационной безопасности и безопасности IT технологий и доступен как на русском, так и на английском языках. Ежемесячно ресурс посещает более 50000 уникальных посетителей, свыше 4000 подписчиков новостей по e-mail и тысячи подписчиков информационного RSS-канала по безопасности. Основную аудиторию сайта составляют системные администраторы и администраторы информационной безопасности. AB - Русская ...
Эксплоиты и подписка на новые эксплоиты - ошибки и эксплоиты
https://securityvulns.ru/exploits
Эксплоиты и подписка на новые эксплоиты. RU] switch to English. RSS подписка c новостями эксплоитов. По другим документам сайта. Поиск эксплоита по ключевому слову:. An unusual local root exploit against CVE-2015-3245 userhelper chfn() newline filtering / CVE-2015-3246 libuser passwd file handling. CVE-2014-0196: Linux kernel = v3.15-rc4: raw mode PTY local echo race condition Slightly-less-than-POC privilege escalation exploit For kernels = v3.14-rc1. HP-UX rlpdaemon local exploit. FreeSSHD all version ...
Статьи - компьютерная безопасность: уязвимости и эксплоиты
https://securityvulns.ru/articles
RU] switch to English. Чтобы просмотреть англоязычные версии статей (вы можете переключить язык вверху любой страницы). SECURITY.NNOV Официальные обзоры. 3APA3A, статьи для журнала Спец:. Производительный файловый сервер под Windows (#066). Утечка данных через служебную информацию и сетевой протокол в клиентском приложении (#058). Безопасность распространенных прикладных сетевых протоколов: взгляд со стороны клиента (#058). NTLM и корпоративные сети. Интервью журналу Спец Хакер (#41). Проблемы CGI на Perl.
TOTAL LINKS TO THIS WEBSITE
78
Security vision seystems | Home
Email : info@securityvs.com. Welcome to Security vision systems. Fire Alarm and Fire Fighting system. Electronic Article Security System. Network Video Recorders (NVR). Camdetech has a standard call-out procedure for each system installed with 24-hour service. Camdetech endeavor to respond telephonically within the hour and on site within 24 hours of being notified. Address : B-2&A-33, Pocket-11, Jasola Vihar,. Email : info@securityvs.com,. Please enter a valid text.
Security vs Hack :: Index
De la 20 eur / luna. Servere dedicate. De la 100 eur / luna - servicii de administrare si monitorizare incluse. Colocare servere. Si echipamente de la 75 eur / luna. Pentru detalii accesati site-ul BluePink. 8226; Log in. The time now is Thu Aug 13, 2015 11:13 pm. Security vs Hack Forum Index. NU suntem responsabili si nu putem fi acuzati pentru eventualele daune provocate in urma vizualizarii materialelor de pe acest site,si folosirea lor in scopuri DISTRUCTIVE! Sat Apr 04, 2009 1:44 pm. The newest regi...
securityvsliberty.blogspot.com
Home of the Free
Home of the Free. It's always been a battle of security vs. liberty. This is how I see it. Friday, February 20, 2009. Is there no hope? Is California at the mercy of the extremist, the ideologues of the two parties? But if successful, his legacy could possibly immortalize him as the man who saved California - from itself. Wednesday, October 8, 2008. Shouldn’t he have his chance? Hasn’t he earned. This country needs more than an overly experienced senator in the White House. We need a visionary. W...It...
Security vs. Privacy - Striking a balance in the modern world
Sharing your phone’s password at the border. Posted by Staff (03/08/2015 @ 12:45 pm). We all understand the importance of border security these days and the importance of keeping dangerous people out of the country. Which brings us to the story of a Canadian man who was charged. Regardless, he’s in trouble now and the rest of us can only hope never to be in that situation. Setting Up the Right Environment for Trading Securities at Home. Posted by Staff (01/12/2015 @ 10:07 am). Peace, Quiet and Comfort.
securityvulnerabilityassessment.com
SecurityVulnerabilityAssessment.com
SecurityVulnerabilityAssessment.com is For Sale for $1,749.30!
Computer Security vulnerabilities and exploits database
Microsoft Windows multiple security vulnerabilities. OpenType fonts parsing code execution, multiple Internet Explorer and Edge vulnerabilities, code execution and information disclosure in system libraries, code execution via RDP and AMB, privilege escalation, information disclosure via WebDAV. Microsoft Office multiple security vulnerabilities. Memory corruptions, code execution. System Center Operations Manager crossite scripting. Crossite scripting in web interface. FreeBSD patch code execution.
Компьютерная безопасность: уязвимости, ошибки и эксплоиты
11 августа 2015 г. Многочисленные уязвимости безопасности в Microsoft Windows. Выполнение кода через шрифты OpenType, многочисленные уязвимости в Internet Explorer и Edge, выполнение кода и раскрытие информации через системные библиотеки, выполнение кода в RDP и SMB, повышение привилегий, раскрытие информации в WebDAV. Многочисленные уязвимости безопасности в Microsoft Office. Повреждения памяти, выполнение кода. Межсайтовый скриптинг в System Center Operations Manager. 10 августа 2015 г. 3 августа 2015 г.
Securityvystroj.cz - Security výstroj
Část pro bezpečnostní složky obchodu Armik.cz. Nákupní košík: 0 položka(y) - 0 Kč. Pouzdra na obranný sprej. Prodáváme také mnoho dalšího zboží →. Haix Airpower X21 High. Přidat do seznamu přání. Přidat do seznamu přání. Přidat do seznamu přání. Krém na obuv Haix 75 ml - černý. Přidat do seznamu přání. Hi-Tec Magnum Mid - černé. Přidat do seznamu přání. Hi-Tec Magnum Regular - černé. Přidat do seznamu přání. Hi-Tec Magnum Mid - hnědé. Přidat do seznamu přání. Přidat do seznamu přání. Všechna práva vyhraz...
Securityvystroj.sk - Security výstroj
Časť pre bezpečnostné zložky obchodu Armik.sk. Nákupný košík: 0 položka(y) - 0,00. Puzdrá na obranný sprej. Predávame aj mnoho ďalšieho tovaru →. Haix Airpower X21 High. Pridať do zoznamu prianí. Pridať do zoznamu prianí. Pridať do zoznamu prianí. Krém na obuv Haix 75 ml - čierny. Pridať do zoznamu prianí. Hi-Tec Magnum Mid - čierne. Pridať do zoznamu prianí. Hi-Tec Magnum Regular - čierne. Pridať do zoznamu prianí. Hi-Tec Magnum Mid - hnedé. Pridať do zoznamu prianí. Pridať do zoznamu prianí.
Servicios Fox Dp, c.a
Security Walkabout | An Information Security Journey
An Information Security Journey. On December 29, 2013. How do you do this? So what happens when something goes wrong? You provided a clear risk assessment on a risky system and the organization chose to proceed anyway and got hacked? Target Security Breach Lessons. On December 24, 2013. Last week Target announced a major breach. Where 40 million consumer credit card numbers were compromised. These credit card numbers are now on the open market. Target is being mum on the details of the breach. Researcher...