Debian Linux Security Advisory 4147-1 - Several vulnerabilities were discovered in PolarSSL, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code.
7ead6a7dc4b5aab9da285061c8c3be7b94df65df2625647f2c613e33c550985d
Red Hat Security Advisory 2018-0576-01 - Red Hat JBoss BRMS is a business rules management system for the management, storage, creation, modification, and deployment of JBoss Rules. This release of Red Hat JBoss BRMS 6.4.9 serves as a replacement for Red Hat JBoss BRMS 6.4.8, and includes bug fixes and enhancements. Issues addressed include unsafe deserialization.
d0ae946550440d0cb883f3cc2701bc608727fa2cdff7235ecc2c15e1174c6c33
Gentoo Linux Security Advisory 201803-11 - Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to arbitrary code execution. Versions less than 2.18.6 are affected.
c800086307ca024083c0bd198492eea46073a6cbde7cbd073fc3a978498b74d1
Gentoo Linux Security Advisory 201803-10 - Gentoo's collectd package contains multiple vulnerabilities, the worst of which may allow local attackers to escalate privileges. Versions less than 5.7.2-r1 are affected.
797bd515d0c2188d1291507f9a2f9de416871069b66a625d363c320b66f7edc3
Secunia Research has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to disclose certain information. The vulnerability is caused due to an error when processing hdmx table and can be exploited to cause an out-of-bounds read memory access.
2a94f7f054339d0976d53276ff87ada9d27f79dcb60ae3b25de95d30dae509bf
Debian Linux Security Advisory 4146-1 - Charles Duffy discovered that the Commandline class in the utilities for the Plexus framework performs insufficient quoting of double-encoded strings, which could result in the execution of arbitrary shell commands.
b72926f8207adf31d74502fe82f90c30cfcde6566e0af737b43a77cbb4d3ca3f
Dell EMC Isilon OneFS suffers from incorrect authorization, cross site request forgery, and path traversal vulnerabilities.
d370d6ca7380127f4ee9a10cf1e94c01b4a479767738e0f423d758f610c85187
Bitbucket suffers from a remote code execution vulnerability in the in-browser editing functionality.
7b0fe5f6f5e4f846a3dbbe67b5ceefa3dddff92a66c6ab499629c8fa85fe953f
Linux Kernel versions prior to 4.15.4 show_floppy KASLR address leak proof of concept exploit.
0141dd0e32ba53533c58e61ecfdc7ade09f92a66df172ac9572a7c4be4fa3a4d
Secunia Research has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to disclose certain information. The vulnerability is caused due to an error within the t2embed.dll module when handling font glyphs and can be exploited to cause an out-of-bounds read memory access.
0b68577b47235ad1c056c8041f6bba0b8dde116c586be554597f34d36dc08fa6
Secunia Research has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to disclose certain information. The vulnerability is caused due to an error within the "MTX_IS_MTX_Data()" function (t2embed.dll) and can be exploited to cause an out-of-bounds read memory access.
2327aa0a2086a47bafe6a4dd4c56ff434f4ad7532bf68b3c9f82ef90955d8b00
Cisco node-jos versions prior to 0.11.0 re-sign tokens proof of concept exploit.
f7e488909b769cf6fe758f382777f08b2e3b059dea0c5b6c8ed8e7fb3e555bec
Whitepaper called Windows Kernel Exploitation Tutorial Part 7: Uninitialized Heap Variable.
0f7117becee933190a4fe8f829c42735c8bb565e9d8903096b32fff8dbe74cb5
LDAP Account Manager version 6.2 suffers from cross site scripting vulnerabilities.
4cbe981a1951b494e2c807b35bf3ba8c5217f9572789e6414e9ba5ed46ffdc94
Domaintrader version 2.5.3 suffers from a cross site scripting vulnerability.
cf451e6c04c419e3e0c7546510171cecbf3b5442d83d853bb4b579d85754ef66
This is a whitepaper providing a Linux kernel hacking introduction. Written in Korean.
70b905774f039dbf1b79d316a75a314dd09b5e5f02ba71bf7dc495772f69434c