Evaluate risks and protect against the most important vulnerabilities
During the last few years, a
significant increase in attacks
exploiting known vulnerabilities in commonly
used programs such as Adobe Acrobat/Reader, Flash, or Internet Explorer is being observed. This is
currently the primary initial
infection vector used to compromise
computers that have Internet access.
Although there are many ways to
protect against cyber attacks and
threats, governments and corporations need to leverage
the most detailed security
intelligence to evaluate and qualify risks, and protect their
infrastructures and assets.
VUPEN Security provides in-depth binary analysis of
the most significant public
vulnerabilities based on disassembly,
reverse engineering, protocol analysis,
and code auditing.
Only Available for trusted organizations
Because of
the
sensitive
nature of
the
information
provided
through
this
service,
VUPEN
Security
has
defined
strict
eligibility
criteria
for
participants.
VUPEN
Security
solely
reserves
the right
to
determine
whether an
organization
or
corporation
meets the
criteria.
Eligible
organizations
are:
- Trusted
Security
Vendors
Providing
Defensive
Software
or
Hardware
(Antivirus,
IPS, IDS)
-
Governments,
Law
Enforcement,
and CERTs
(countries
members of
NATO,
ANZUS,
ASEAN)
-
Worldwide
Corporations
and MSSPs
(Fortune
1000,
Finance,
Technology,
Research)
BA for Security Vendors
BA for Corporations & MSSPs
BA for Governments & CERTs
Receive More Information
Why subscribe to this service?
With 20 to 25 binary analysis and
private exploits/PoCs released each
month, the
VUPEN In-Depth
Binary Analysis and Exploits service
allows organizations
and corporations to
evaluate and qualify risks, and protect
national
infrastructures and corporate assets
from emerging attacks.
As a
subscriber, you will also have a
direct access to the VUPEN
Vulnerability Research Team,
the most active security team in the
world.
Latest Binary Analysis and
Exploits/PoCs
Released by VUPEN
Foxit Reader Plugin for Firefox URL Remote Buffer Overflow (NO-CVE) [BA+Code]
|
Oracle Java 7 MethodHandles Lookup Sandbox Bypass Code Execution (CVE-2013-0422) [BA+Code]
|
Nagios Core "history.cgi" URL Processing Remote Buffer Overflow (CVE-2012-6096) [BA+Code]
|
Microsoft Internet Explorer Use-after-free Remote Code Execution (MS13-008)
|
VLC Media Player "libsubsdec" Subtitle Processing Heap Overflow (NO-CVE) [BA+Code]
|
MySQL Server "GRANT" Statement Processing Stack Buffer Overflow (CVE-2012-5611) [BA+Code]
|
FreeBSD "linux_ifconf()" Memory Corruption Local Privilege Escalation (CVE-2012-4576) [BA+Code]
|
Apple Quicktime "Content-Type" HTTP Header Remote Stack Overflow (CVE-2012-3753) [BA+Code]
|
Apple Quicktime TeXML Style "font-table" Remote Stack Overflow (CVE-2012-3752) [BA+Code]
|
Mozilla Firefox "str_unescape()" Stack Buffer Overflow (MFSA 2012-96 / CVE-2012-4204) [BA+Code]
|
Mozilla Firefox "DocumentViewerImpl" Remote After-Free (MFSA 2012-105 / NO-CVE) [BA+Code]
|
Mozilla Firefox "imgRequestProxy" Remote Use-After-Free (MFSA 2012-105 / NO-CVE) [BA+Code]
|
Microsoft Windows Shell Briefcase Processing Integer Overflow (MS12-072 / CVE-2012-1528) [BA+Code]
|
Microsoft Office Excel "SerAuxErrBar" Record Heap Overflow (MS12-076 / CVE-2012-1885) [BA+Code]
|
Microsoft Office Excel "Publisher" Record Heap Overflow (MS12-076 / CVE-2012-1886) [BA+Code]
|
|
2004-2013 VUPEN Security - Copyright
-
Privacy Policy |
|
|
gipoco.com
is neither affiliated with the authors of this page or responsible
for its contents. This is a safe-cache copy of the original web site.
gipoco.com
is neither affiliated with the authors of this page nor responsible
for its contents. This is a safe-cache copy of the original web site.
|