Subscribe via feed.
Archive for May, 2017

Microsoft Windows win32k!xxxClientLpkDrawTextEx Memory Disclosure

Posted by deepcore under exploit (No Respond)

Microsoft Windows suffers from a stack memory disclosure vulnerability in win32k!xxxClientLpkDrawTextEx.

NextCloud / OwnCloud Cross Site Scripting

Posted by deepcore under exploit (No Respond)

NextCloud and OwnCloud suffer from a cross site scripting vulnerability in their error pages. OwnCloud versions 9.1.5 and below are affected. NextCloud versions prior to 11.0.3, 10.0.5, and 9.0.58 are affected.

Shadow Brokers Resurface, Offer To Sell Fresh 'Wine Of The Month' Club Exploits

Posted by deepcore under exploit (No Respond)

Cryptocurrency Botnet Used NSA Exploits Weeks Before WCry

Posted by deepcore under exploit (No Respond)

http://tup.pkn2.go.th

Posted by deepcore under defacement (No Respond)

http://tup.pkn2.go.th notified by Emperor-Team

Tags:

WP Newsletter Supsystic 1.1.7 – Cross Site Vulnerability

Posted by deepcore under exploit (No Respond)

An independent vulnerability laboratory researcher discovered a cross site scripting vulnerability in the official News…

Apple Security Advisory 2017-05-15-1

Posted by deepcore under Apple (No Respond)

Apple Security Advisory 2017-05-15-1 – macOS 10.12.5 is now available and addresses certificate validation, privilege escalation, and various other vulnerabilities.

Tags: , ,

Apple Security Advisory 2017-05-15-2

Posted by deepcore under Apple (No Respond)

Apple Security Advisory 2017-05-15-2 – iOS 10.3.2 is now available and addresses memory corruption, code execution, and various other vulnerabilities.

Tags: , ,

Apple Security Advisory 2017-05-15-3

Posted by deepcore under Apple (No Respond)

Apple Security Advisory 2017-05-15-3 – tvOS 10.2.1 is now available and addresses memory corruption, code execution, and various other vulnerabilities.

Tags: , ,

Apple Security Advisory 2017-05-15-4

Posted by deepcore under Apple (No Respond)

Apple Security Advisory 2017-05-15-4 – watchOS 3.2.1 is now available and addresses memory corruption, code execution, and various other vulnerabilities.

Tags: , ,