vi

FlashFXP 4.2.0 Build 1730 Denial Of Service

FlashFXP version 4.2.0 build 1730 denial of service proof of concept exploit.




vi

Nsauditor 3.2.0.0 Denial Of Service

Nsauditor version 3.2.0.0 denial of service proof of concept exploit.




vi

Product Key Explorer 4.2.2.0 Denial Of Service

Product Key Explorer version 4.2.2.0 Key denial of service proof of concept exploit.




vi

Frigate 3.3.6 Denial Of Service

Frigate version 3.3.6 denial of service proof of concept exploit.




vi

UltraVNC Launcher 1.2.4.0 Denial Of Service

UltraVNC Launcher version 1.2.4.0 Password denial of service proof of concept exploit.




vi

UltraVNC Viewer 1.2.4.0 Denial Of Service

UltraVNC Viewer version 1.2.4.0 VNCServer denial of service proof of concept exploit.




vi

UltraVNC Launcher 1.2.4.0 Denial Of Service

UltraVNC Launcher version 1.2.4.0 RepeaterHost denial of service proof of concept exploit.




vi

SpotAuditor 5.3.4 Denial Of Service

SpotAuditor version 5.3.4 Name denial of service proof of concept exploit.




vi

ZOC Terminal 7.25.5 Denial Of Service

ZOC Terminal version 7.25.5 denial of service proof of concept exploit.




vi

dnsmasq-utils 2.79-1 Denial Of Service

dnsmasq-utils version 2.79-1 dhcp_release denial of service proof of concept exploit.




vi

ZOC Terminal 7.25.5 Denial Of Service

ZOC Terminal version 7.25.5 Script denial of service proof of concept exploit.




vi

Amcrest Dahua NVR Camera IP2M-841 Denial Of Service

Amcrest Dahua NVR Camera IP2M-841 denial of service proof of concept exploit.







vi

Secunia Security Advisory 17850

Secunia Security Advisory - r0t has reported a vulnerability in QualityEBiz Quality PPC (QualityPPC), which can be exploited by malicious people to conduct cross-site scripting attacks.




vi

Secunia Security Advisory 48336

Secunia Security Advisory - A vulnerability has been reported in Inout PPC Engine, which can be exploited by malicious people to conduct cross-site request forgery attacks.




vi

Linux Kernel Sendpage Local Privilege Escalation

The Linux kernel failed to properly initialize some entries the proto_ops struct for several protocols, leading to NULL being derefenced and used as a function pointer. By using mmap(2) to map page 0, an attacker can execute arbitrary code in the context of the kernel. Several public exploits exist for this vulnerability, including spender's wunderbar_emporium and rcvalle's ppc port, sock_sendpage.c. All Linux 2.4/2.6 versions since May 2001 are believed to be affected: 2.4.4 up to and including 2.4.37.4; 2.6.0 up to and including 2.6.30.4








vi

Chkrootkit Local Privilege Escalation

Chkrootkit before 0.50 will run any executable file named /tmp/update as root, allowing a trivial privsec. WfsDelay is set to 24h, since this is how often a chkrootkit scan is scheduled by default.




vi

Serious Apache Server Bug Gives Root To Baddies In Shared Environments




vi

Anti-Virus Vendor Trio Plug Website Flaws




vi

FreeBSD Security Advisory - FreeBSD-SA-18:13.nfs

FreeBSD Security Advisory - Insufficient and improper checking in the NFS server code could cause a denial of service or possibly remote code execution via a specially crafted network packet. A remote attacker could cause the NFS server to crash, resulting in a denial of service, or possibly execute arbitrary code on the server.




vi

FreeBSD Security Advisory - FreeBSD-SA-18:14.bhyve

FreeBSD Security Advisory - Insufficient bounds checking in one of the device models provided by bhyve(8) can permit a guest operating system to overwrite memory in the bhyve(8) processing possibly permitting arbitrary code execution. A guest OS using a firmware image can cause the bhyve process to crash, or possibly execute arbitrary code on the host as root.




vi

FreeBSD Intel SYSRET Privilege Escalation

This Metasploit module exploits a vulnerability in the FreeBSD kernel, when running on 64-bit Intel processors. By design, 64-bit processors following the X86-64 specification will trigger a general protection fault (GPF) when executing a SYSRET instruction with a non-canonical address in the RCX register. However, Intel processors check for a non-canonical address prior to dropping privileges, causing a GPF in privileged mode. As a result, the current userland RSP stack pointer is restored and executed, resulting in privileged code execution.




vi

FreeBSD Security Advisory - FreeBSD-SA-19:03.wpa

FreeBSD Security Advisory - Multiple vulnerabilities exist in the hostapd(8) and wpa_supplicant(8) implementations.




vi

FreeBSD Security Advisory - FreeBSD-SA-19:07.mds

FreeBSD Security Advisory - On some Intel processors utilizing speculative execution a local process may be able to infer stale information from microarchitectural buffers to obtain a memory disclosure. An attacker may be able to read secret data from the kernel or from a process when executing untrusted code (for example, in a web browser).




vi

FreeBSD rtld execl() Privilege Escalation

This Metasploit module exploits a vulnerability in the FreeBSD run-time link-editor (rtld). The rtld unsetenv() function fails to remove LD_* environment variables if __findenv() fails. This can be abused to load arbitrary shared objects using LD_PRELOAD, resulting in privileged code execution.




vi

Linux / FreeBSD TCP-Based Denial Of Service

Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the minimum segment size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed _"SACK Panic_," allows a remotely-triggered kernel panic on recent Linux kernels. There are patches that address most of these vulnerabilities. If patches can not be applied, certain mitigations will be effective.






vi

Slackware Security Advisory - mozilla-thunderbird Updates

Slackware Security Advisory - New mozilla-thunderbird packages are available for Slackware 14.2 and -current to fix security issues.




vi

Slackware Security Advisory - expat Updates

Slackware Security Advisory - New expat packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.




vi

Slackware Security Advisory - mozilla-thunderbird Updates

Slackware Security Advisory - New mozilla-thunderbird packages are available for Slackware 14.2 and -current to fix security issues.




vi

Slackware Security Advisory - tcpdump Updates

Slackware Security Advisory - New libpcap and tcpdump packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.




vi

Slackware Security Advisory - sudo Updates

Slackware Security Advisory - New sudo packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.




vi

Slackware Security Advisory - python Updates

Slackware Security Advisory - New python packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.




vi

Slackware Security Advisory - mozilla-firefox Updates

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.2 and -current to fix security issues.




vi

Slackware Security Advisory - libtiff Updates

Slackware Security Advisory - New libtiff packages are available for Slackware 14.2 and -current to fix security issues.




vi

Slackware Security Advisory - Slackware 14.2 kernel Updates

Slackware Security Advisory - New kernel packages are available for Slackware 14.2 to fix security issues.




vi

Slackware Security Advisory - Slackware 14.2 kernel Updates

Slackware Security Advisory - New kernel packages are available for Slackware 14.2 to fix security issues.




vi

Slackware Security Advisory - bind Updates

Slackware Security Advisory - New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.




vi

Slackware Security Advisory - mozilla-firefox Updates

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.2 and -current to fix security issues.




vi

Slackware Security Advisory - wavpack Updates

Slackware Security Advisory - New wavpack packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.




vi

Slackware Security Advisory - openssl Updates

Slackware Security Advisory - New openssl packages are available for Slackware 14.2 and -current to fix a security issue.




vi

Slackware Security Advisory - tigervnc Updates

Slackware Security Advisory - New tigervnc packages are available for Slackware 14.2 and -current to fix security issues.




vi

Slackware Security Advisory - mozilla-firefox Updates

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.2 and -current to fix security issues.