Virtual Private Server Alessandro Stesi

Virtual Private Server (VPS)

Virtual Private Server (VPS) – Codice sconto del 70%

I primi 100 utenti riceveranno un codice sconto del 70% sull’abbonamento annuale:

  • VPS M = $ 42.41 invece di $ 141.36
  • VPS L = $ 84.86 invece di $ 282.86
  • VPS XL = $ 169.76 invece di $ 565.86
  • VPS XL = $ 424.47 invece di $ 1,414.87

Per usufruire di questa promozione, seguire i seguenti passi:

  • 1) Accedere a http://www.secure-od.com/VPS.html
  • 2) Selezionare un VPS tra M, L, XL and XXL
  • 3) Selezionare il ciclo di fatturazione annuale
  • 4) Inserire il seguente codice sconto: D5HHXCXNYCTX

L’offerta terminerà il 31 Maggio, 2013.
Solo per i primi 100 utenti!

Scopri il Cloud server

Condividi


RSS

Piu’ articoli…

Categorie …

Tags

RSS CSIRT

RSS Dark Reading:

RSS Full Disclosure

  • Backdoor.Win32.NetBull.11.a / Remote Buffer Overflow Gennaio 19, 2021
    Posted by malvuln on Jan 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/80e98fdf726a3e727f3414bdbf2e86bb.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.NetBull.11.a Vulnerability: Remote Buffer Overflow Description: Netbull listens on both TCP ports 23444 and 23445, sending a large string of junk chars causes stack corruption overwriting EDX register. Type: PE32 MD5:...
  • Email-Worm.Win32.Agent.gi / Remote Stack Buffer Overflow - (UDP Datagram) Gennaio 19, 2021
    Posted by malvuln on Jan 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/74e65773735f977185f6a09f1472ea46.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Email-Worm.Win32.Agent.gi Vulnerability: Remote Stack Buffer Overflow - (UDP Datagram) Description: Creates a service "Microsoft ASPI Manager" and listens on TCP ports 80, 81 and UDP 53. The service process is a […]
  • Constructor.Win32.SMWG.c / Insecure Permissions Gennaio 19, 2021
    Posted by malvuln on Jan 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/47e819a6ce3d5e93819f4842cfbe23d6.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Constructor.Win32.SMWG.c Vulnerability: Insecure Permissions Description: Description: SMWG - P2P VBS.sucke.gen worm generator by sevenC / N0:7 outputs its malicious VBS script granting change (C) permissions to authenticated users group. Type:...
  • Constructor.Win32.SMWG.a / Insecure Permissions Gennaio 19, 2021
    Posted by malvuln on Jan 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/07cd532823d6ab05d6e5e3a56f7afbfd.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Constructor.Win32.SMWG.a Vulnerability: Insecure Permissions Description: Win32.SMWG VBS.sucke.gen worm generator by sevenC / N0:7 outputs its malicious VBS script granting change (C) permissions to authenticated users group. Type: PE32 MD5:...
  • Newfuture Trojan V.1.0 BETA 1 / Insecure Permissions Gennaio 19, 2021
    Posted by malvuln on Jan 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/4f9376824718ff23a6238c877f73ff73.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Newfuture Trojan V.1.0 BETA 1 Vulnerability: Insecure Permissions Description: Newfuture by Wider is a remote access client and has a (Fast_sms) server component, it is written in spanish. On installation it […]
  • Backdoor.Win32.Mnets / Remote Stack Buffer Overflow - (UDP Datagram Proto) Gennaio 19, 2021
    Posted by malvuln on Jan 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/1e42493dcef54a62bc28e0a1338c1142.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Mnets Vulnerability: Remote Stack Buffer Overflow - (UDP Datagram Proto) Description: The backdoor listens for commands on UDP ports 2222 and 4444. Sending a mere 323 bytes we can overwrite the […]
  • Backdoor.Win32.Whgrx / Remote Host Header Stack Buffer Overflow Gennaio 19, 2021
    Posted by malvuln on Jan 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/eb6fd418cd3b52132ffb029b52839edf.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Whgrx Vulnerability: Remote Host Header Stack Buffer Overflow Description: The specimen listens on datagram UDP port 65000, by sending a specially crafted HTTP PUT request and specifying a large string of […]
  • Backdoor.Win32.Latinus.b / Remote Buffer Overflow Gennaio 19, 2021
    Posted by malvuln on Jan 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/9adffcc98cd658a7f9c5419480013f72.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Latinus.b Vulnerability: Remote Buffer Overflow Description: Malware listens on both TCP ports 11831 and 29559, by sending an HTTP OPTIONS request with about 8945 bytes we trigger buffer overflow and overwriting […]
  • Backdoor.Win32.Nucleroot.t - MaskPE 1.6 / File Based Buffer Overflow Gennaio 19, 2021
    Posted by malvuln on Jan 19Discovery / credits: Malvuln - malvuln.com (c) 20211 Original source: https://malvuln.com/advisory/170d3ccf9f036c552aef6690bf419b2e.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Nucleroot.t - MaskPE 1.6 Vulnerability: File Based Buffer Overflow Description: Description: MaskPE by yzkzero is a tool for implanting backdoors in existing PE files. The Backdoor tool doesnt properly check the […]
  • Backdoor.Win32.Nucleroot.bi - MaskPE 2.0 / File Based Buffer Overflow Gennaio 19, 2021
    Posted by malvuln on Jan 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/25e0570cc803cd77abc2268b41237937.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Nucleroot.bi - MaskPE 2.0 Vulnerability: File Based Buffer Overflow Description: MaskPE by yzkzero is a tool for implanting backdoors in existing PE files. The Backdoor tool doesnt properly check the files […]

Customers

Newsletter