http://www.ppsf.doae.go.th/wordpress/Mloki.htm notified by Mloki
>> AUTHOR: deepcore
http://www.ppsf.doae.go.th/wordpress/Mloki.htm notified by Mloki
There is an intra-object overflow in Shannon Baseband, inside the 5G MM protocol implementation (NrmmMsgCodec as it is called in Shannon according to debug strings), specifically when handling the Service…
XNU NFSSVC suffers from root check bypass and use-after-free vulnerabilities due to insufficient locking in upcall worker threads.
Microsoft SQL Server 2014, 2016, 2017, 2019, and 2022 appears to ignore audit rules for sys.sysxlgns allowing an attacker with administrative permissions to extract password hashes under the radar. Microsoft…
For various versions of Bitbucket, there is an authenticated command injection vulnerability that can be exploited by injecting environment variables into a user name. This module achieves remote code execution…
Proof of concept code for a critical Microsoft Outlook vulnerability for Windows that allows hackers to remotely steal hashed passwords by simply receiving an email.
Ubuntu Security Notice 5958-1 – It was discovered that FFmpeg could be made to dereference a null pointer. An attacker could possibly use this to cause a denial of service…
Proof of concept code for a critical Microsoft Outlook vulnerability for Windows that allows hackers to remotely steal hashed passwords by simply receiving an email.
http://drr10.drr.go.th/kurd.html notified by 0x1998
http://chiangmai.drr.go.th/kurd.html notified by 0x1998