pr

proftp_ppc.c

Proftpd (<= pre6) linux ppc remote exploit.




pr

Linux Kernel Sendpage Local Privilege Escalation

The Linux kernel failed to properly initialize some entries the proto_ops struct for several protocols, leading to NULL being derefenced and used as a function pointer. By using mmap(2) to map page 0, an attacker can execute arbitrary code in the context of the kernel. Several public exploits exist for this vulnerability, including spender's wunderbar_emporium and rcvalle's ppc port, sock_sendpage.c. All Linux 2.4/2.6 versions since May 2001 are believed to be affected: 2.4.4 up to and including 2.4.37.4; 2.6.0 up to and including 2.6.30.4






pr

Chkrootkit Local Privilege Escalation

Chkrootkit before 0.50 will run any executable file named /tmp/update as root, allowing a trivial privsec. WfsDelay is set to 24h, since this is how often a chkrootkit scan is scheduled by default.




pr

42: The Answer To Life, The Universe, And How Many Cisco Products Have Struts Bugs




pr

American Express Bitten By XSS Bugs Again




pr

Microsoft To Fix IE8 Cross-Site Scripting Problem, Again




pr

FreeBSD Intel SYSRET Privilege Escalation

This Metasploit module exploits a vulnerability in the FreeBSD kernel, when running on 64-bit Intel processors. By design, 64-bit processors following the X86-64 specification will trigger a general protection fault (GPF) when executing a SYSRET instruction with a non-canonical address in the RCX register. However, Intel processors check for a non-canonical address prior to dropping privileges, causing a GPF in privileged mode. As a result, the current userland RSP stack pointer is restored and executed, resulting in privileged code execution.




pr

FreeBSD rtld execl() Privilege Escalation

This Metasploit module exploits a vulnerability in the FreeBSD run-time link-editor (rtld). The rtld unsetenv() function fails to remove LD_* environment variables if __findenv() fails. This can be abused to load arbitrary shared objects using LD_PRELOAD, resulting in privileged code execution.




pr

Hackers Shut Down NDDC Website Over Presidential Inauguration






pr

Nigerian Prince Swaps The Sweet Talk For Keyloggers And Exploits





pr

Network Time Protocol Bugs Sting Juniper Operating System




pr

Slackware Security Advisory - proftpd Updates

Slackware Security Advisory - New proftpd packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.







pr

VMware Patches Privilege Escalation Vulnerability In Fusion, Horizon
















pr

Botnet Of 20,000 WordPress Sites Are Attacking Other WordPress Sites




pr

WordPress Sites Under Attack Via Zero-Day In Abandoned Plugin






pr

Hackers Actively Exploit WordPress Plugin Open Redirect Flaws






pr

Researchers Find Serious Flaws In WordPress Plugins Used On 400k Sites




pr

Critical XSS Vulnerability Patched In WordPress Plugin GDPR Cookie Consent







pr

Dassault Systèmes and the FDA Extend Collaboration to Inform Cardiovascular Device Review Process and Accelerate Access to New Treatments

•An in silico clinical trial is underway with the 3DEXPERIENCE platform to evaluate the Living Heart simulated 3D heart for transforming how new devices can be tested •Five-year extension of their collaborative research agreement aims to spur medical device innovation by enabling innovative, new product designs •Both Dassault Systèmes and the FDA recognize the transformative impact of modeling and simulation on public health and patient safety




pr

Dassault Aviation Advances its Next Generation Enterprise Platform: 3DEXPERIENCE for All Programs

•Dassault Aviation will rely on six Dassault Systèmes industry solution experiences to integrate business processes, improve performance and reduce costs •Deployment marks next step in Dassault Aviation’s digital transformation plan through a platform approach, launched in 2018 •Dassault Systèmes’ 3DEXPERIENCE platform will power artificial intelligence-based application for intelligent enterprise services