Dissecting stack based buffer overflow
what is a buffer? In general, the term buffer is a temporary storage, a space in the memory used to…
what is a buffer? In general, the term buffer is a temporary storage, a space in the memory used to…
A new kind of botnet in cyber security has been uncovered which takes an innovative approach to find security vulnerabilities…
It took us close to nine months to translate our idea into reality. We had debated the idea (for ANCOR,…
One of the most common memory corruption errors usually found in an application is the “Double Free” error. Double-free vulnerability…
Any program intended to disrupt computer or network operation, gather sensitive information, or gain access to private computer systems or…
In firefox version 3.6 or higher, VMware Remote Console Plug-in will not load properly. To open VMWare Remote Console, there…
There is no “magic box” security. I can’t buy a device in the market that can be plugged in somewhere…
SecPod intends to publish security advisories in an XML format that conforms to Common Vulnerability Reporting Format (CVRF version 1.1).…
SecPod Research Team member (Antu Sanadi) has found a Denial Of Service Vulnerability in Oxide Webserver. The vulnerability is caused…
SecPod Research Team member (Antu Sanadi) has found Cross-Site Scripting and SQL Injection Vulnerabilities in NetArt Media Pharmacy System. The…