Worm.Win32.Ngrbot.abpr malware suffers from an insecure permissions vulnerability.
659134a5a1759b9458935738d7e5ca0e
Ubuntu Security Notice 4887-1 - De4dCr0w of 360 Alpha Lab discovered that the BPF verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker could use this to expose sensitive information or possibly execute arbitrary code. Adam Nichols discovered that heap overflows existed in the iSCSI subsystem in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Various other issues were also addressed.
ec10d1a53d4fcdd31e305a6e8e3837d5
Red Hat Security Advisory 2021-0976-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include denial of service and memory leak vulnerabilities.
a7382fea42e90d76347dcac72b38eb1c
Online Faculty Clearance System version 1.0 suffers from a remote shell upload vulnerability.
79bc85565f117cac4e713d381f853d87
Online Faculty Clearance System version 1.0 suffers from a persistent cross site scripting vulnerability.
4464502cf50f4cc6a00c0a984646051c
Trojan-Dropper.Win32.Dycler.yhb malware suffers from an insecure permissions vulnerability.
e29fc69ff4dda14c4e8383ddc91f5ffd
Intel Rapid Storage Technology (RST) User Interface and Driver suffers from a privilege escalation vulnerability.
e647cdaedf7e9e47e97cf2341e94e8ae
Red Hat Security Advisory 2021-0975-01 - The Public Key Infrastructure Core contains fundamental packages required by Red Hat Certificate System. Issues addressed include a cross site scripting vulnerability.
5264eaa9a31e8bbc2a39dbd51520261c
Codiad version 2.8.4 remote code execution exploit.
40e0c008f687d615731fb5edca2f3d2a
Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.
c7c227ffd3fdd61440c3f98fd1e5a380
This whitepaper explains how xml external entity and server-side request forgery vulnerabilities work and how they can be combined to perform attacks.
ade02889096d0c4736522c32d4c95692
Worm.Win32.Detnat.c malware suffers from an insecure permissions vulnerability.
1cdc3c79c3abffd54884f2e0b259214a
Ext2Fsd version 0.68 suffers from an unquoted service path vulnerability.
4a8139b137aeeeb6d21d0e5c75ed5a92
Virus.Win32.Sality.gen malware suffers from an insecure permissions vulnerability.
009100a4a08b8268e37261c483b7f961
WordPress MapifyLife plugin versions 3.3 and below suffer from a persistent cross site scripting vulnerability.
12998cba1b9d742b2679ff6fcef76da7