1.
Backdoor.Gift
Gift, also known as Backdoor.Gift, is a Visual Basic backdoor Trojan. ... Backdoor.Gift provides the attacker with the ability to perform the following ...
2.
Symantec Scan Engine Authentication Bypass
This is done through HTTPS TCP port 8005. The protocol used in the transfer of this information is implemented using eXtensible Markup Language (XML). ...
3.
Oracle Database SYS.KUPW-WORKER Package MAIN Procedure SQL Injection
KUPW$WORKER.MAIN. This is suspected to start the monitoring of a job instance. ... KUPW$WORKER.MAIN function. The flaw is specific to improper sanitization ...
4.
HP JetDirect LCD Modification
HP JetDirect LCD Modification. ... Title: HP JetDirect LCD Modification. Severity: MODERATE. Description: JetDirect is a series of printers, ...
5.
Invalid Call Sequence Character In SIP Message
Title: Invalid Call Sequence Character In SIP Message. Severity: MODERATE. Description:. Session Initiation Protocol (SIP) is an American Standard Code for ...
6.
AckCmd Probe
Trojan AckCmd is a backdoor Trojan that was originally designed to be a proof of the ACK Tunneling concept. AckCmd operates using the client-server ...
7.
FreeBSD telnetd Buffer Overflow
Product Information; Security Products Overview · Juniper Networks ISG Series ... FreeBSD is an open source Unix kernel. It is derived from BSD UNIX, ...
8.
Neoteris IVE 'changepassword.cgi' Brute Force Attempt
Juniper Neoteris IVE is software that allows a remote user to access to a private network using a secure SSL connection and a web browser. ...
9.
Juniper Networks :: Current Job Openings by Function
Current Job Openings by Function. Juniper Networks currently has positions available in the following areas: Administration (3); Business Development (1) ...
10.
Beast Backdoor Trojan
The Beast Backdoor Trojan listens for control connections on Transmission Control Protocol (TCP) ports 666 or 6666 by default, but can be arbitrarily set by ...