<img href="http://www.ghoztcraft.net/Uploader/files/1/dos55.PNG">
try this to get your own


download file
http://rapidshare.com/files/120770936/DoS_5.0.rar.html

Views: 11030 | Added by: Siegh_Wahrhreit | Date: 27 May 2009 | Comments (2)


<?php
       /*
       COWON America jetCast 2.0.4.1109 (.mp3) local heap buffer overlow exploit (xp/sp3)
       by Nine:Situations:Group::pyrokinesis

       site: http://retrogod.altervista.org/
       software site: http://www.jetaudio.com/
       Tested against JetAudio pack v.7.5.2
       ---------------------------------------------------------------------------------
       Passing an overlong string as id3 tag we have:

       (370.7a8): Access violation - code c0000005 (first chance)
       First chance exceptions are reported before any exception handlin ... Read more »
Views: 8352 | Added by: Siegh_Wahrhreit | Date: 27 May 2009 | Comments (0)

Jakob Lell from the TU Berlin computer security working group (
http://www.agrs.tu-berlin.de/v-menue/ag_rechnersicherheit/parameter/en/
) has discovered multiple vulnerabilities in several ATEN IP KVM
Switches.


Affected products:
- ATEN KH1516i IP KVM Switch (browser firmware version 1.0.063)
- ATEN KN9116  IP KVM Switch (firmware version 1.1.104)
- Aten PN9108  Power over the NET (only CVE-2009-1477)

The KH1508i uses the same firmware as the KH1516i and is thus most
likely affected as well. The KN9108 uses the same firmware as the
KN9116. It is possible that other devices are affected as well. If you
have access to other similar devices and want to test whether they are
vulnerable as well, please contact me at jakob@cs.tu-berlin.de.


... Read more »
Views: 8713 | Added by: Siegh_Wahrhreit | Date: 27 May 2009 | Comments (0)

close