View this email as Webpage |
|
To be removed from this list please visit manage subscription to unsubscribe. Media LLC |
View this email as Webpage |
|
To be removed from this list please visit manage subscription to unsubscribe. Media LLC |
A water softener is a device that removes hardness from water, typically by exchanging calcium and magnesium ions for sodium ions. This process, known as ion exchange, occurs within a resin bed, which is composed of small, porous beads made of a material called ion-exchange resin.
Why is a Water Softener Needed for Well Water?Well water often contains high levels of dissolved minerals, including calcium and magnesium, which cause hardness. Hard water can create several problems, such as:
A water softener can be a valuable investment for well water users, providing numerous benefits and improving overall water quality. By choosing the right water softener and properly installing and maintaining it, you can enjoy the advantages of softened water throughout your home.
--http://www.kahusecurity.com |
Exploit Pack Table Update 20 |
---|
Click to view or download from Google Apps |
Gong Da / GonDad | Redkit 2.2 | x2o (Redkit Light) | Fiesta (=Neosploit) | Cool Styxy | DotkaChef | |
---|---|---|---|---|---|---|
CVE-2011-3544 | CVE-2013-2551 | CVE-2013-2465 | CVE-2010-0188 | CVE-2010-0188 | CVE-2012-5692 | |
CVE-2012-0507 | CVE-2013-2471 | CVE-2013-0074/3896 | CVE-2011-3402 | CVE-2013-1493 | ||
CVE-2012-1723 | CVE-2013-1493 | CVE-2013-0431 |
| CVE-2013-2423 | ||
CVE-2012-1889 | CVE-2013-2460 | CVE-2013-0634 | CVE-2013-1493 | |||
CVE-2012-4681 | CVE-2013-2551 | CVE-2013-2423 | ||||
CVE-2012-5076 | ||||||
CVE-2013-0422 | ||||||
CVE-2013-0634 | ||||||
CVE-2013-2465 |
Angler | FlashPack = SafePack | White Lotus | Magnitude (Popads) | Nuclear 3.x | Sweet Orange |
---|---|---|---|---|---|
CVE-2013-0074/3896 | CVE-2013-0074/3896 | CVE-2011-3544 | CVE-2011-3402 | CVE-2010-0188 | CVE-2013-2423 |
CVE-2013-0634 | CVE-2013-2551 | CVE-2013-2465 | CVE-2012-0507 | CVE-2012-1723 | CVE-2013-2471 |
CVE-2013-2551 | CVE-2013-2551 | CVE-2013-0634 | CVE-2013-0422 | CVE-2013-2551 | |
CVE-2013-5329 | CVE-2013-2460 | CVE-2013-2423 | |||
CVE-2013-2471 ?? | CVE-2013-2471 | CVE-2013-2460 | |||
CVE-2013-2551 | CVE-2013-2551 |
CK | HiMan | Neutrino | Blackhole (last) | Grandsoft | Private EK |
---|---|---|---|---|---|
CVE-2011-3544 | CVE-2010-0188 | CVE-2013-0431 | CVE-2013-0422 | CVE-2010-0188 | CVE-2006-0003 |
CVE-2012-1889 | CVE-2011-3544 | CVE-2013-2460 | CVE-2013-2460 | CVE-2011-3544 | CVE-2010-0188 |
CVE-2012-4681 | CVE-2013-0634 | CVE-2013-2463* | CVE-2013-2471 | CVE-2013-0422 | CVE-2011-3544 |
CVE-2012-4792* | CVE-2013-2465 | CVE-2013-2465* | and + all or some | CVE-2013-2423 | CVE-2013-1347 |
CVE-2013-0422 | CVE-2013-2551 | CVE-2013-2551 | exploits | CVE-2013-2463 | CVE-2013-1493 |
CVE-2013-0634 | * switch 2463*<>2465* | from the previous | CVE-2013-2423 | ||
CVE-2013-3897 | Possibly + exploits | version | CVE-2013-2460 | ||
* removed | from the previous | ||||
version |
Sakura 1.x | LightsOut | Glazunov | Rawin | Flimkit | Cool EK (Kore-sh) | Kore (formely Sibhost) |
---|---|---|---|---|---|---|
cve-2013-2471 | CVE-2012-1723 | CVE-2013-2463 | CVE-2012-0507 | CVE-2012-1723 | CVE-2013-2460 | CVE-2013-2423 |
CVE-2013-2460 | CVE-2013-1347 | cve-2013-2471 | CVE-2013-1493 | CVE-2013-2423 | CVE-2013-2463 | CVE-2013-2460 |
and + all or some | CVE-2013-1690 | CVE-2013-2423 | CVE-2013-2471 | CVE-2013-2463 | ||
exploits | CVE-2013-2465 | CVE-2013-2471 | ||||
from the previous | ||||||
version |
Styx 4.0 | Cool | Topic EK | Nice EK |
---|---|---|---|
CVE-2010-0188 | CVE-2012-0755 | CVE-2013-2423 | CVE-2012-1723 |
CVE-2011-3402 | CVE-2012-1876 | ||
CVE-2012-1723 | CVE-2013-0634 | ||
CVE-2013-0422 | CVE-2013-2465 | ||
CVE-2013-1493 | cve-2013-2471 | ||
CVE-2013-2423 | and + all or some | ||
CVE-2013-2460 | exploits | ||
CVE-2013-2463 | from the previous | ||
CVE-2013-2472 | version | ||
CVE-2013-2551 | |||
Social Eng |
08-'12 |
Also includes
"Flash pack" (presumably the same as before)
"Quicktime" - CVE-2010-1818 ?
If you find any errors or CVE information for packs not featured , please send it to my email (in my profile above, thank you very much) .
- Blackhole 1.2.1 (Java Rhino added, weaker Java exploits removed)
- Blackhole 1.2.1 (Java Skyline added)
- Sakura Exploit Pack 1.0 (new kid on the block, private pack)
- Phoenix 2.8. mini (condensed version of 2.7)
- Fragus Black (weak Spanish twist on the original, black colored admin panel, a few old exploits added)
Merry Christmas Pack read analysis atkahusecurity.com | Best Pack kahusecurity.comread analysis at | Sava Pack read analysis at kahusecurity.com |
Eleonore 1.6.5 [+] CVE-2011-0611 [+] CVE-2011-0559 [+] CVE-2010-4452 [-] CVE-2010-0886 | Salo Pack Old (2009), added just for the collection | Zero Pack 62 exploits from various packs (mostly Open Source pack) |
LinuQ pack Designed to compromise linux servers using vulnerable PHPMyAdmin. Comes with DDoS bot but any kind of code can be loaded for Linux botnet creation.LinuQ pack is PhpMyAdmin exploit pack with 4 PMA exploits based on a previous Russian version of the Romanian PMA scanner ZmEu. it is not considered to be original, unique, new, or anything special. All exploits are public and known well. It is designed to be installed on an IRC server (like UnrealIRCD). IP ranges already listed in bios.txt can be scanned, vulnerable IPs and specific PMA vulnerabilities will be listed in vuln.txt, then the corresponding exploits can be launched against the vulnerable server. It is more like a bot using PMA vulnerabilities than exploit pack. It is using CVE-2009-1148 (unconfirmed) CVE-2009-1149 (unconfirmed) CVE-2009-1150 (unconfirmed) CVE-2009-1151 (confirmed) |
Go1Pack (not included) as reported as being a fake pack, here is a gui. Here is a threatpost article referencing it as it was used for an attack
- Eleonore 1.6.4
- Eleonore 1.6.3a
- Incognito
- Blackhole