to

Common Desktop Environment 2.3.1 Buffer Overflow

A buffer overflow in the CheckMonitor() function in the Common Desktop Environment 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in a malicious .Xdefaults file. Note that Oracle Solaris CDE is based on the original CDE 1.x train, which is different from the CDE 2.x codebase that was later open sourced. Most notably, the vulnerable buffer in the Oracle Solaris CDE is stack-based, while in the open source version it is heap-based.




to

Common Desktop Environment 1.6 Local Privilege Escalation

A buffer overflow in the _SanityCheck() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier allows local users to gain root privileges via a long calendar name or calendar owner passed to sdtcm_convert in a malicious calendar file. The open source version of CDE (based on the CDE 2.x codebase) is not affected, because it does not ship the vulnerable program. Versions 1.6 and below are affected.




to

Common Desktop Environment 2.3.1 / 1.6 libDtSvc Buffer Overflow

A difficult to exploit stack-based buffer overflow in the _DtCreateDtDirs() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier may allow local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges via a long X11 display name. The vulnerable function is located in the libDtSvc library and can be reached by executing the setuid program dtsession. Versions 2.3.1 and below as well as 1.6 and earlier are affected.




to

Linux's systemd Vulnerable To DNS Server Attack




to

BIND Comes Apart Thanks To Ancient Denial Of Service Vuln




to

Unprecedented DNS Hijacking Attacks Linked To Iran






to

New Attack On Home Routers Sends Users To Spoofed Sites That Push Malware




to

CurveBall Microsoft Windows CryptoAPI Spoofing Proof Of Concept

This is a proof of concept exploit that demonstrates the Microsoft Windows CryptoAPI spoofing vulnerability as described in CVE-2020-0601 and disclosed by the NSA.




to

Gentoo Linux Security Advisory 202004-06

Gentoo Linux Security Advisory 202004-6 - A regression in GnuTLS breaks the security guarantees of the DTLS protocol. Versions less than 3.6.13 are affected.




to

Git Credential Helper Protocol Newline Injection

A git clone action can leak cached / stored credentials for github.com to example.com due to insecure handling of newlines in the credential helper protocol.




to

OpenSSL Toolkit 1.1.1g

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.




to

Rootstealer X11 Code Executor

Rootstealer is a program to detect when a linux user opens a terminal with root and it injects intrusive commands in the terminal with X11.




to

Online Clothing Store 1.0 SQL Injection

Online Clothing Store version 1.0 suffers from a remote SQL injection vulnerability.




to

Brutus FTP Attack Tool 0.3

Brutus is a small threaded python FTP brute-force and dictionary attack tool. It supports several brute-force parameters such as a custom character sets, password length, minimum password length, prefix, and postfix strings to passwords generated.




to

KeePass Simple Dictionary Password Enumerator

This is a simple perl script to perform dictionary attacks against the KeePass password manager.




to

RSA Factorization Attack Using Fermat's Algorithm

Script that performs RSA factorization attack using Fermat's algorithm.




to

SSH/SSL RSA Private Key Passphrase Dictionary Enumerator

This is a script to perform SSH/SSL RSA private key passphrase enumeration with a dictionary attack.





to

Brain Hack Devices Must Be Scrutinized, Say Top Scientists






to

First Clinical Trial Of Gene Editing To Help Target Cancer

















to

Germany Urges Parents To Destroy Snooping Smartwatches