Packetstorm Security
Facebook Says Data From 530M Users Was Obtained By Scraping
Hackers Hit 9 Countries, Expose 623,036 Payment Card Records
How Your Phone Can Be Hacked For $16
Data From 500M LinkedIn Users Posted For Sale Online
Critical Zoom Vulnerability Triggers Remote Code Execution Without User Input
Google Chrome SimplfiedLowering Integer Overflow
This Metasploit module exploits an issue in Google Chrome versions before 87.0.4280.88 (64 bit). The exploit makes use of an integer overflow in the SimplifiedLowering phase in turbofan. It is used along with a typer hardening bypass using ArrayPrototypeShift to create a JSArray with a length of -1. This is abused to gain arbitrary read/write into the isolate region. Then an ArrayBuffer can be used to achieve absolute arbitrary read/write. The exploit then uses WebAssembly in order to allocate a region of RWX memory, which is then replaced with the payload shellcode. The payload is executed within the sandboxed renderer process, the browser must be run with the --no-sandbox option for the payload to work correctly.
GRAudit Grep Auditing Tool 2.9
Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility, grep. It's comparable to other static analysis applications like RATS, SWAAT, and flaw-finder while keeping the technical requirements to a minimum and being very flexible.
Red Hat Security Advisory 2021-1079-01
Red Hat Security Advisory 2021-1079-01 - Red Hat Ansible Automation Platform Resource Operator container images with security fixes. Ansible Automation Platform manages Ansible Platform jobs and workflows that can interface with any infrastructure on a Red Hat OpenShift Container Platform cluster, or on a traditional infrastructure that is running off-cluster. Data exposure issues have been addressed.
Red Hat Security Advisory 2021-1145-01
Red Hat Security Advisory 2021-1145-01 - Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.
PrestaShop 1.7.6.7 SQL Injection
PrestaShop version 1.7.6.7 suffers from a remote blind SQL injection vulnerability.
Ubuntu Security Notice USN-4896-2
Ubuntu Security Notice 4896-2 - USN-4896-1 fixed a vulnerability in lxml. This update provides the corresponding update for Ubuntu 14.04 ESM. It was discovered that lxml incorrectly handled certain HTML attributes. A remote attacker could possibly use this issue to perform cross-site scripting attacks. Various other issues were also addressed.
Tableau Server Open Redirection
Tableau Server versions 2019.4-2019.4.17, 2020.1-2020.1.13, 2020.2-2020.2.10, 2020.3-2020.3.6, and 2020.4-2020.4.2 suffer from an open redirection vulnerability.
Backdoor.Win32.Small.n Code Execution
Backdoor.Win32.Small.n malware suffers from a code execution vulnerability.
DMA Radius Manager 4.4.0 Cross Site Request Forgery
DMA Radius Manager version 4.4.0 suffers from a cross site request forgery vulnerability.
Check Point Identity Agent Arbitrary File Write
Check Point Identity Agent versions prior to R81.018.0000 allow for an arbitrary file overwrite action with escalated privileges.
Red Hat Security Advisory 2021-1135-01
Red Hat Security Advisory 2021-1135-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Issues addressed include a HTTP request smuggling vulnerability.
D-Link DSL-320B-D1 Pre-Authentication Buffer Overflow
The D-Link DSL-320B-D1 ADSL modem suffers from multiple pre-authentication stack buffer overflow vulnerabilities.
Backdoor.Win32.Hupigon.das Unauthenticated Open Proxy
Backdoor.Win32.Hupigon.das malware has an unauthenticated open proxy functionality.
Linux Kernel 5.4 BleedingTooth Remote Code Execution
Linux kernel version 5.4 BleedingTooth bluetooth zero-click proof of concept remote code execution exploit.
%7Cutmcsr%3D(direct)%7Cutmcmd%3D(none))
Packet Storm - Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
Подписаться на лента Packetstorm Security