Worm.Win32.Ngrbot.abpr malware suffers from an insecure permissions vulnerability.
7a22745ea500d74a5f1a7740902c445c3894052667d6e549fd9c7a448f2b37a2
Ubuntu Security Notice 4887-1 - De4dCr0w of 360 Alpha Lab discovered that the BPF verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker could use this to expose sensitive information or possibly execute arbitrary code. Adam Nichols discovered that heap overflows existed in the iSCSI subsystem in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Various other issues were also addressed.
9a06c7465cb26d1b56d2a8903cc4d503a19d30e3db18b40322b2ce482b14f4f4
Red Hat Security Advisory 2021-0976-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include denial of service and memory leak vulnerabilities.
ed6d7e102f1b4e37a2da41f9d1966f2dac7244eb7995ddad82640e346cb8846a
Online Faculty Clearance System version 1.0 suffers from a remote shell upload vulnerability.
e07a9067539080deb6fb956554ca334c889c080e56e3e2f9c0aa3b5375927980
Online Faculty Clearance System version 1.0 suffers from a persistent cross site scripting vulnerability.
6875ed0dd6c758b4e4ebac21b7fee30fe9d822ab7a43d54863257e832c38b5bb
Trojan-Dropper.Win32.Dycler.yhb malware suffers from an insecure permissions vulnerability.
5b8635395547a8b74fb67153691469653a1cedad2521880570c008d0b745924a
Intel Rapid Storage Technology (RST) User Interface and Driver suffers from a privilege escalation vulnerability.
6c71160434a8022aa6306e32ffb5e3ea17e9aa3bb0bf6410c87cef4fc16fae95
Red Hat Security Advisory 2021-0975-01 - The Public Key Infrastructure Core contains fundamental packages required by Red Hat Certificate System. Issues addressed include a cross site scripting vulnerability.
43bbb83f6bb7c1d839fd97bdec8cd2f514ca5257370f01e83a495d78692fbb77
Codiad version 2.8.4 remote code execution exploit.
514909c821d725393b7f344480ae65374e79e1d4fd01c64c28e89c7bbf387755
Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.
0240d34a2f99d157063e31d0c2d2801a68bc015e09187d9cc197637ec8fda635
This whitepaper explains how xml external entity and server-side request forgery vulnerabilities work and how they can be combined to perform attacks.
5b911234c50bade2c82b7c0909cc2946fb8a97e0d2a48acfa8f8fd489233bb49
Worm.Win32.Detnat.c malware suffers from an insecure permissions vulnerability.
9ccad4e55e3a3e803ca52e54600b17fe697355fc43420bd3fe836728e60998ff
Ext2Fsd version 0.68 suffers from an unquoted service path vulnerability.
3dfea806bfba5a76e7679dd620809905d87f609dd4bd143b6393ac437fe577d8
Virus.Win32.Sality.gen malware suffers from an insecure permissions vulnerability.
9b66ab1368a4c3fe91b946b901afdfa465d198645395ef6800db3cf6d2447a03
WordPress MapifyLife plugin versions 3.3 and below suffer from a persistent cross site scripting vulnerability.
e41b2a293290512503e176f752626d6634377c72c9f00f6e053861f554f2e528