Backdoor.Win32.Androm.df Code Execution
Backdoor.Win32.Androm.df malware suffers from a code execution vulnerability.
Backdoor.Win32.Androm.df malware suffers from a code execution vulnerability.
There is a heap corruption bug that can occur when QT processes a malformed TIFF image. It happens because the size of the QImageData backing the image is calculated is calculated using the format of the image, meanwhile TIFFReadScanline calculates the length to be read based on TIFFScanlineSize, which determines the size base on three […]
Looking at the Mojo implementation of Chrome’s legacy IPC, the legacy ipc::Message type is transferred inside a BigBuffer.
This Metasploit module exploits an input validation error on the log file extension parameter. It does not properly validate upper/lower case characters. Once this occurs, the application log file will be treated as a php file. The log file can then be populated with php code by changing the username of a valid user, as […]
This Metasploit module exploits an unauthenticated command injection in Cisco HyperFlex HX Data Platform’s /storfs-asup endpoint to execute shell commands as the Tomcat user.