[local] – Microsoft Windows win32k Local Privilege Escalation (MS15-010)
[webapps] – Ovidentia maillist Module 4.0 – Remote File Inclusion Exploit
Wireshark Dissct_rsl_ipaccess_msg Out-Of-Bounds Read
An ASAN build of Wireshark suffers from a static out-of-bounds read in Dissct_rsl_ipaccess_msg.
Wireshark Dissect_zcl_pwr_prof_pwrprofstatersp Out-Of-Bounds Read
An ASAN build of Wireshark suffers from a static out-of-bounds read in Dissect_zcl_pwr_prof_pwrprofstatersp.
Wireshark Wmem_alloc Assertion Failure Crash
An ASAN build of Wireshark suffers from an assertion failure crash in Wmem_alloc.
Wireshark Dissect_tds7_colmetadata_token Buffer Overflow
An ASAN build of Wireshark suffers from a stack-based buffer overflow in Dissect_tds7_colmetadata_token.
FireEye Wormable Remote Code Execution In MIP JAR Analysis
The FireEye MPS (Malware Protection System) is vulnerable to a remote code execution vulnerability, simply from monitoring hostile traffic. FireEye is designed to operate as a passive network tap, so that it can see all the files and emails that enter a monitored network. This vulnerability allows an attacker to compromise the FireEye device, get […]
PHPads 2.0 File Disclosure
PHPads version 2.0 suffers from a file disclosure vulnerability.
Ubuntu setgid Directory Privilege Escalation
This is a short article how to use the setgid directory /var/cache/man to escalate privileges from man/man to man/root on Ubuntu Vivid.