as

Adobe Flash Active-X 28.0.0.137 Remote Code Execution

Adobe Flash Active-X plugin version 28.0.0.137 remote code execution proof of concept exploit.




as

Bash 5.0 Patch 11 Privilege Escalation

An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.




as

Bash Profile Persistence

This Metasploit module writes an execution trigger to the target's Bash profile. The execution trigger executes a call back payload whenever the target user opens a Bash terminal. A handler is not run automatically, so you must configure an appropriate exploit/multi/handler to receive the callback.




as

FlashFXP 4.2.0 Build 1730 Denial Of Service

FlashFXP version 4.2.0 build 1730 denial of service proof of concept exploit.




as

dnsmasq-utils 2.79-1 Denial Of Service

dnsmasq-utils version 2.79-1 dhcp_release denial of service proof of concept exploit.









as

VLCMediaSlayer-ppc.pl.txt

Month Of Apple Bugs - A vulnerability in the handling of the udp:// URL handler for the VLC Media Player allows remote arbitrary code execution. This is just a vanilla format string exploit for OSX on ppc.




as

Were Oslo's Terror Blasts Caused By Car Bombs?




as

Police Say Oslo Suspect Admits To 'Facts' In Massacre
















as

RubyOnRails XSS Vulnerability Claims Twitter, Basecamp And My Confidence




as

XSS Vulnerabilities In 8 Million Flash Files




as

Adobe Updates Flash Player To Fix XSS Flaw





as

Linux / FreeBSD TCP-Based Denial Of Service

Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the minimum segment size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed _"SACK Panic_," allows a remotely-triggered kernel panic on recent Linux kernels. There are patches that address most of these vulnerabilities. If patches can not be applied, certain mitigations will be effective.







as

JUNOS (Juniper) Flaw Exposes Core Routers To Kernel Crash







as

Gulf Scheme Reveals BlackBerry SWP Tap-Cash Support














as

Satellite Weather Forecast: Cloudy WIth A Chance Of p0wnage