Learn Search

Search across all Learn content

SecPod Labs

Security Research

In-depth CVE write-ups, vulnerability analysis, and security intelligence from the SecPod Research team.

CVE-2013-7260: RealNetworks RealPlayer Stack-Based Buffer Overflow

CVE Research

CVE-2013-7260: RealNetworks RealPlayer Stack-Based Buffer Overflow

RealPlayer is vulnerable to multiple stack-based buffer overflow vulnerabilities (CVE-2013-7260). This flaw allows attackers to execute arbitrary code and take complete control of the system remotely. Affected versions of RealPlayer are before 17.0.4.61 on Windows systems. This flaw can be mitigated...

Feb 10, 2014 • 2 min read

CVE-2014-0497 : Adobe releases critical security patch for Flash Player

CVE Research

CVE-2014-0497 : Adobe releases critical security patch for Flash Player

Feb 05, 2014 • 1 min read

Xml eXternal Entity (XXE) Attack

CVE Research

Xml eXternal Entity (XXE) Attack

XXE attack is an attack on an application that parses XML input from untrusted sources using an incorrectly configured XML parser. A Vulnerability Management Software can stop these attacks.

Jan 11, 2014 • 3 min read

Exploit Kits: Cybercriminal’s ultimate weapon

CVE Research

Exploit Kits: Cybercriminal’s ultimate weapon

Exploit kits are automated malicious software programs which target client-side application vulnerabilities like Web Browsers, Add-ons, Adobe Flash Player, Adobe Reader, Java Runtime Environment, etc. Therefore, Vulnerability Management Software can help you prevent these.

Jan 01, 2014 • 3 min read

Anti-virus is dead?

CVE Research

Anti-virus is dead?

Anti-virus or Anti-malware is not dead; it is one of the defense mechanism in a defense-in-depth strategy. Here is the Importance of Anti Virus.

Dec 26, 2013 • 3 min read

Dissecting stack based buffer overflow

CVE Research

Dissecting stack based buffer overflow

what is a buffer?

Dec 22, 2013 • 4 min read

Hunting the Egg: Egg Hunter

CVE Research

Hunting the Egg: Egg Hunter

A bit of a background on buffer overflow to begin with. A buffer overflow occurs when a program tries to write more data into a buffer than it can. This makes it overrun and writes data in an unallocated memory location. If we carefully craft the data, we can control the flow of execution and then d...

Dec 22, 2013 • 5 min read

Advanced Power Botnet: Innovative Approach to find Security Vulnerabilities

CVE Research

Advanced Power Botnet: Innovative Approach to find Security Vulnerabilities

A new kind of botnet in cyber security has been uncovered which takes an innovative approach to find security vulnerabilities in the website using systems installed with illegitimate Mozilla Firefox add-on. An investigation by KrebsOnSecurity has revealed. Using a vulnerability management solution.

Dec 16, 2013 • 2 min read

Introduction to IDA Pro

CVE Research

Introduction to IDA Pro

IDA Pro is primarily a multi-platform, multi-processor disassembler that translates machine executable code into assembly language source code for the purpose of debugging and reverse engineering. On various platforms, people are using it as a local or as a remote debugger.  The development of Plug-...

Nov 18, 2013 • 5 min read