science and technology

Adobe Plagued By 16-Month-Old XSS Bug




science and technology

Mozilla Tackles XSS Vulnerabilities With New Technology




science and technology

MoD Website Outflanked By XSS Flaws




science and technology

RubyOnRails XSS Vulnerability Claims Twitter, Basecamp And My Confidence




science and technology

Facebook App Flaws Create Trojan Download Risk




science and technology

Reddit Swiftly Squishes XSS Worm




science and technology

XSS Vulnerabilities In 8 Million Flash Files




science and technology

IE 8 XSS Filter Exposes Sites To XSS Attacks




science and technology

Microsoft To Fix IE8 Cross-Site Scripting Problem, Again




science and technology

Serious XSS Flaw Haunts Microsoft SharePoint




science and technology

Anti-Virus Vendor Trio Plug Website Flaws




science and technology

Adobe Updates Flash Player To Fix XSS Flaw




science and technology

Patchy App Development Security Slammed




science and technology

Postcards From The Post-XSS World





science and technology

Abusing Password Managers With XSS




science and technology

FreeBSD Security Advisory - FreeBSD-SA-18:13.nfs

FreeBSD Security Advisory - Insufficient and improper checking in the NFS server code could cause a denial of service or possibly remote code execution via a specially crafted network packet. A remote attacker could cause the NFS server to crash, resulting in a denial of service, or possibly execute arbitrary code on the server.




science and technology

FreeBSD Security Advisory - FreeBSD-SA-18:14.bhyve

FreeBSD Security Advisory - Insufficient bounds checking in one of the device models provided by bhyve(8) can permit a guest operating system to overwrite memory in the bhyve(8) processing possibly permitting arbitrary code execution. A guest OS using a firmware image can cause the bhyve process to crash, or possibly execute arbitrary code on the host as root.




science and technology

FreeBSD Intel SYSRET Privilege Escalation

This Metasploit module exploits a vulnerability in the FreeBSD kernel, when running on 64-bit Intel processors. By design, 64-bit processors following the X86-64 specification will trigger a general protection fault (GPF) when executing a SYSRET instruction with a non-canonical address in the RCX register. However, Intel processors check for a non-canonical address prior to dropping privileges, causing a GPF in privileged mode. As a result, the current userland RSP stack pointer is restored and executed, resulting in privileged code execution.




science and technology

FreeBSD Security Advisory - FreeBSD-SA-19:03.wpa

FreeBSD Security Advisory - Multiple vulnerabilities exist in the hostapd(8) and wpa_supplicant(8) implementations.




science and technology

FreeBSD Security Advisory - FreeBSD-SA-19:07.mds

FreeBSD Security Advisory - On some Intel processors utilizing speculative execution a local process may be able to infer stale information from microarchitectural buffers to obtain a memory disclosure. An attacker may be able to read secret data from the kernel or from a process when executing untrusted code (for example, in a web browser).




science and technology

FreeBSD rtld execl() Privilege Escalation

This Metasploit module exploits a vulnerability in the FreeBSD run-time link-editor (rtld). The rtld unsetenv() function fails to remove LD_* environment variables if __findenv() fails. This can be abused to load arbitrary shared objects using LD_PRELOAD, resulting in privileged code execution.




science and technology

Linux / FreeBSD TCP-Based Denial Of Service

Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the minimum segment size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed _"SACK Panic_," allows a remotely-triggered kernel panic on recent Linux kernels. There are patches that address most of these vulnerabilities. If patches can not be applied, certain mitigations will be effective.




science and technology

macOS Kernel wait_for_namespace_event() Race Condition / Use-After-Free

In the macOS kernel, the XNU function wait_for_namespace_event() in bsd/vfs/vfs_syscalls.c releases a file descriptor for use by userspace but may then subsequently destroy that file descriptor using fp_free(), which unconditionally frees the fileproc and fileglob. This opens up a race window during which the process could manipulate those objects while they're being freed. Exploitation requires root privileges.




science and technology

Anonymous Hacker Exposed After Dropping USB Drive While Throwing Molotov Cocktail







science and technology

US Navy Captures Suspected Pirates After Gunbattle




science and technology

US Marines Capture Ship Hijacked By Pirates Off Somalia




science and technology

Nigerian Airline Ticket Fraudster Gets 8 Years




science and technology

Hacker Almost Derailed Mandela Election In South Africa





science and technology

Kenya's Treasury Website Attacked By Hackers




science and technology

Hackers Shut Down NDDC Website Over Presidential Inauguration




science and technology

Medvet Board To Investigate Privacy Breach










science and technology

Nigerian Prince Swaps The Sweet Talk For Keyloggers And Exploits




science and technology

Hack Attacks Cut Internet Access In Liberia





science and technology

Ebola Outbreak Reaches City Of 1 Million Residents