An issue was discovered in the Linux kernel through version 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges. The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access. The issue exists in nft_setelem_parse_data […]
This Metasploit module utilizes the Mobile Mouse Server by RPA Technologies, Inc protocol to deploy a payload and run it from the server. This module will only deploy a payload if the server is set without a password (default). Tested against 3.6.0.4, the current version at the time of module writing.
http://pbns.go.th/robots.txt notified by Typical Idiot Security
Tags:
defacement
http://www.spin.dss.go.th/bas/public/site/images/admin1/mwhehe.gif notified by Simsimi
Tags:
defacement
Food Ordering Management System version 1.0 suffers from a remote SQL injection vulnerability.
Online Birth Certificate Management System version 1.0 suffers from a cross site request forgery vulnerability.
Online Birth Certificate Management System version 1.0 suffers from an insecure direct object reference vulnerability.
Online Birth Certificate Management System version 1.0 suffers from a persistent cross site scripting vulnerability.
Online Birth Certificate Management System version 1.0 suffers from a cross site scripting vulnerability.
COVESA versions 2.18.8 and below suffer from heap buffer over-read and null pointer dereference vulnerabilities.