se

Nsauditor 3.2.0.0 Denial Of Service

Nsauditor version 3.2.0.0 denial of service proof of concept exploit.




se

Product Key Explorer 4.2.2.0 Denial Of Service

Product Key Explorer version 4.2.2.0 Key denial of service proof of concept exploit.




se

Frigate 3.3.6 Denial Of Service

Frigate version 3.3.6 denial of service proof of concept exploit.




se

UltraVNC Launcher 1.2.4.0 Denial Of Service

UltraVNC Launcher version 1.2.4.0 Password denial of service proof of concept exploit.




se

UltraVNC Viewer 1.2.4.0 Denial Of Service

UltraVNC Viewer version 1.2.4.0 VNCServer denial of service proof of concept exploit.




se

UltraVNC Launcher 1.2.4.0 Denial Of Service

UltraVNC Launcher version 1.2.4.0 RepeaterHost denial of service proof of concept exploit.




se

SpotAuditor 5.3.4 Denial Of Service

SpotAuditor version 5.3.4 Name denial of service proof of concept exploit.




se

ZOC Terminal 7.25.5 Denial Of Service

ZOC Terminal version 7.25.5 denial of service proof of concept exploit.




se

dnsmasq-utils 2.79-1 Denial Of Service

dnsmasq-utils version 2.79-1 dhcp_release denial of service proof of concept exploit.




se

ZOC Terminal 7.25.5 Denial Of Service

ZOC Terminal version 7.25.5 Script denial of service proof of concept exploit.




se

Amcrest Dahua NVR Camera IP2M-841 Denial Of Service

Amcrest Dahua NVR Camera IP2M-841 denial of service proof of concept exploit.








se

Secunia Security Advisory 17850

Secunia Security Advisory - r0t has reported a vulnerability in QualityEBiz Quality PPC (QualityPPC), which can be exploited by malicious people to conduct cross-site scripting attacks.




se

Linux sock_sendpage() NULL Pointer Dereference

Linux 2.4 and 2.6 kernel sock_sendpage() NULL pointer dereference exploit. The third and final version of this exploit. This third version features: Complete support for i386, x86_64, ppc and ppc64; The personality trick published by Tavis Ormandy and Julien Tinnes; The TOC pointer workaround for data items addressing on ppc64 (i.e. functions on exploit code and libc can be referenced); Improved search and transition to SELinux types with mmap_zero permission.




se

Secunia Security Advisory 48336

Secunia Security Advisory - A vulnerability has been reported in Inout PPC Engine, which can be exploited by malicious people to conduct cross-site request forgery attacks.




se

Linux Kernel Sendpage Local Privilege Escalation

The Linux kernel failed to properly initialize some entries the proto_ops struct for several protocols, leading to NULL being derefenced and used as a function pointer. By using mmap(2) to map page 0, an attacker can execute arbitrary code in the context of the kernel. Several public exploits exist for this vulnerability, including spender's wunderbar_emporium and rcvalle's ppc port, sock_sendpage.c. All Linux 2.4/2.6 versions since May 2001 are believed to be affected: 2.4.4 up to and including 2.4.37.4; 2.6.0 up to and including 2.6.30.4




se

Were Oslo's Terror Blasts Caused By Car Bombs?




se

Norweigian Oil And Defense Industries Are Hit By A Major Cyber Attack
















se

Attack On Apache Server Exposes Firewalls, Routers, Etc






se

Apache ActiveMQ Flaws Leave Servers Open To DoS Attacks





se

42: The Answer To Life, The Universe, And How Many Cisco Products Have Struts Bugs




se

Serious Apache Server Bug Gives Root To Baddies In Shared Environments




se

Contest Seeks The Most Diminutive XSS Worm





se

Scripting Bugs Blight Security Giants' Websites




se

RubyOnRails XSS Vulnerability Claims Twitter, Basecamp And My Confidence




se

IE 8 XSS Filter Exposes Sites To XSS Attacks




se

Serious XSS Flaw Haunts Microsoft SharePoint






se

FreeBSD Security Advisory - FreeBSD-SA-18:13.nfs

FreeBSD Security Advisory - Insufficient and improper checking in the NFS server code could cause a denial of service or possibly remote code execution via a specially crafted network packet. A remote attacker could cause the NFS server to crash, resulting in a denial of service, or possibly execute arbitrary code on the server.




se

FreeBSD Security Advisory - FreeBSD-SA-18:14.bhyve

FreeBSD Security Advisory - Insufficient bounds checking in one of the device models provided by bhyve(8) can permit a guest operating system to overwrite memory in the bhyve(8) processing possibly permitting arbitrary code execution. A guest OS using a firmware image can cause the bhyve process to crash, or possibly execute arbitrary code on the host as root.