ux

Indian Maharaja Wins Third Successive Award for Best Asian Luxury Train

Indian luxury train, the Indian Maharaja, has bagged the award for the Best Asian Luxury Train for the third year in a row. The train was felicitated at World Travel Awards 2012, quoted by Wall Street Journal as “the travel industry’s equivalent to the Oscars”. The awards are...



  • Wed
  • 31 Oct 2012 00:00:00

ux

Maharaja’s Express Awarded the Best Luxury Train in the World at World Travel Awards 2012

Popular Indian luxury train, The Maharaja’s Express, has been awarded World’s Leading Luxury Train 2012 at the World Travel Awards 2012 held in New Delhi yesterday. The train was one of the contenders for the coveted title of the best luxury train in the world which included the...



  • Thu
  • 13 Dec 2012 00:00:00

ux

Indian Luxury Trains Adds ‘Fairy Queen’ to its Portfolio

Indian Luxury Trains (ILT), India’s first luxury train portal, is all set to add the Fairy Queen  train, India’s oldest running steam locomotive, to its portfolio. The Fairy Queen train was jolted down last year following the vandalizing & stealing of the brass parts of this...



  • Fri
  • 21 Dec 2012 00:00:00

ux

Affordable Luxury - Deccan Odyssey Last Minute Deals

Did you know that India's has its very own fleet of trains similar to the legendary Orient Exprees of the West. There’s one more reason why you should book Deccan Odyssey for luxury train tour package with IndianLuxuryTrains.Com As the luxury train season draws to its conclusion by...



  • Thu
  • 21 Feb 2013 00:00:00

ux

NHL Viewers Club: Mario Lemieux's five-goal outburst at Madison Square Garden

The game had star power, sizzle and 14 total goals. Plus, we debate Lemieux's status in the GOAT rankings, and how these Penguins would fare in today's NHL.




ux

map_to_mux

HI!

I want to use map_to_mux pragma for a particular logic in my code, which is in generate block. 

module xyz

parameter P_IN_WIDTH= 100

parameter P_OUT_WIDTH =100

parameter P_XXX = 1

parameter P_ZZZ=1

parameter P_IN_OFFSET_WD = 10

input [P_IN_WD-1:0]  in_data;

input [P_IN_OFFSET_WD-1:0] in_offset;

output [P_IN_WD-1:0]  out_data;

generate
if (P_XXX == 1)

// cadence infer_mux "MUX"
// cadence map_to_mux "MUX"

begin : XXX

assign c_out = (in_data >> in_offset*P_ZZZ);
end
else

// cadence infer_mux "MUX"
// cadence map_to_mux "MUX"
begin : YYY
assign c_out = (in_data << in_offset*P_ZZZ);
end
endgenerate

endmodule




ux

News18 Urdu: Latest News Buxar

visit News18 Urdu for latest news, breaking news, news headlines and updates from Buxar on politics, sports, entertainment, cricket, crime and more.




ux

Linux Kernel v2.4 Released




ux

Linux Kernel 2.2/2.4 Local Root Ptrace Vulnerability





ux

Security Flaws Force Linux Kernel Upgrade




ux

Remote Buffer Overflow Bug Bites Linux Kernel




ux

Clever New Attack Exploits Fully-Patched Linux Kernel




ux

Linux Devs Exterminate Security Bugs From Kernel




ux

Linux Kernel Purged Of Five-Year-Old Root Access Bug




ux

Die-Hard Bug Bytes Linux Kernel For Second Time





ux

IPUX CS7522/CS2330/CS2030 IP Camera Stack Buffer Overflow

The UltraHVCam ActiveX Control 'UltraHVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraHVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include PT Type ICS2330, Cube Type ICS2030, and Dome Type ICS7522.




ux

IPUX CL5452/CL5132 IP Camera Stack Buffer Overflow

The UltraSVCam ActiveX Control 'UltraSVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraSVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include Bullet Type ICL5132 and Bullet Type ICL5452.




ux

Linux sock_sendpage() NULL Pointer Dereference

Linux 2.4 and 2.6 kernel sock_sendpage() NULL pointer dereference exploit. The third and final version of this exploit. This third version features: Complete support for i386, x86_64, ppc and ppc64; The personality trick published by Tavis Ormandy and Julien Tinnes; The TOC pointer workaround for data items addressing on ppc64 (i.e. functions on exploit code and libc can be referenced); Improved search and transition to SELinux types with mmap_zero permission.




ux

Linux Kernel Sendpage Local Privilege Escalation

The Linux kernel failed to properly initialize some entries the proto_ops struct for several protocols, leading to NULL being derefenced and used as a function pointer. By using mmap(2) to map page 0, an attacker can execute arbitrary code in the context of the kernel. Several public exploits exist for this vulnerability, including spender's wunderbar_emporium and rcvalle's ppc port, sock_sendpage.c. All Linux 2.4/2.6 versions since May 2001 are believed to be affected: 2.4.4 up to and including 2.4.37.4; 2.6.0 up to and including 2.6.30.4




ux

Linux / FreeBSD TCP-Based Denial Of Service

Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the minimum segment size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed _"SACK Panic_," allows a remotely-triggered kernel panic on recent Linux kernels. There are patches that address most of these vulnerabilities. If patches can not be applied, certain mitigations will be effective.





ux

Linux/x86 Reverse Shell NULL Free 127.0.0.1:4444 Shellcode

91 bytes small Linux/x86 reverse shell NULL free 127.0.0.1:4444 shellcode.




ux

Linux/x86 execve /bin/sh Shellcode

25 bytes small Linux/x86 execve /bin/sh shellcode.




ux

Linux/x86 execve(/bin/sh) Socket Reuse Shellcode

42 bytes small Linux/x86 execve(/bin/sh) socket reuse shellcode.




ux

Linux/x86 (NOT|ROT+8 Encoded) execve(/bin/sh) Null Free Shellcode

47 bytes small Linux/x86 (NOT|ROT+8 Encoded) execve(/bin/sh) null free shellcode.




ux

Linux/x86 Encoder / Decoder Shellcode

117 bytes small Linux/x86 encoding of random bytes + XOR/SUB/NOT/ROR and also decodes ROL/NOT/ADD/XOR execve(/bin/sh) shellcode.




ux

Linux x86_x64 sys_creat("ajit", 0755) Shellcode

53 bytes small Linux/x86_x64 sys_creat("ajit", 0755) shellcode.




ux

Linux/x86 Execve() Alphanumeric Shellcode

66 bytes small Linux/x86 Execve() alphanumeric shellcode.




ux

Linux/x86 Random Bytes Encoder + XOR/SUB/NOT/ROR execve(/bin/sh) Shellcode

114 bytes small Linux/x86 random bytes encoder and XOR/SUB/NOT/ROR execve(/bin/sh) shellcode.




ux

Linux/x86 Reboot Polymorphic Shellcode

26 bytes small Linux/x86 reboot polymorphic shellcode.




ux

Linux/x86 Egghunter / Null-Free Shellcode

33 bytes small Linux/x86 egghunter null-free shellcode.




ux

Linux/x64_86 Egghunter Execve Shellcode

63 bytes small Linux/x64_86 dynamic egghunter shellcode that searches memory for 2 instances of the egg. When the eggs are found, the egghunter passes execution control to the payload at the memory address of the eggs. The payload is an execve(/bin/bash) shellcode.




ux

Linux Password Protected Bindshell Shellcode

272 bytes small Linux/x86_64 null free password protected bindshell shellcode.




ux

Linux/x64_86 ROL Encoded Execve Shellcode

57 bytes small Linux/x64_86 /bin/bash shellcode. The stub decodes the ROL Encoded shellcode. When the stub has finished decoding the payload, execution control is passed to the payload.




ux

Linux/x86 Egghunter Shellcode

39 bytes small Linux/x86 egghunter null-free shellcode. The egghunter dynamically searches memory for 2 instances of the egg. When the eggs are found, the egghunter passes execution control to the payload at the memory address of the eggs.




ux

Gentoo Linux Security Advisory 201909-01

Gentoo Linux Security Advisory 201909-1 - Multiple vulnerabilities have been found in Perl, the worst of which could result in the arbitrary execution of code. Versions less than 5.28.2 are affected.





ux

Gentoo Linux Security Advisory 202003-38

Gentoo Linux Security Advisory 202003-38 - A vulnerability in Imagick PHP extension might allow an attacker to execute arbitrary code. Versions less than 3.4.4 are affected.




ux

linux-history.html

The Great War: Linux -vs- Minix




ux

Mandriva Linux Security Advisory 2007.226

Mandriva Linux Security Advisory - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. The minix filesystem code allows local users to cause a denial of service (hang) via a malformed minix file stream. An integer underflow in the Linux kernel prior to 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set.




ux

Mandriva Linux Security Advisory 2007.232

Mandriva Linux Security Advisory - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. The minix filesystem code allows local users to cause a denial of service (hang) via a malformed minix file stream. An integer underflow in the Linux kernel prior to 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set.




ux

Linux PTRACE_TRACEME Local Root

Linux kernel versions starting at 4.10 and below 5.1.7 PTRACE_TRACEME local root exploit that uses the pkexec technique.




ux

Linux 5.3 Insecure Root Path Handling

Linux versions 5.3 and above appear to have an issue where io_uring suffers from insecure handling of the root directory for path lookups.




ux

Linux/x86 Add Root User Shellcode

107 bytes small Linux/x86 shellcode that adds the user 'ctl' with the password 'ctl' to the /etc/passwd file with the UID and GID of 0 (root). This shellcode uses legacy passwd functionality. Therefore the /etc/shadow file does not need to be accessed or modified.




ux

Linux/x86 Dynamic MMX+FPU Encoded Add Root User Shellcode

155 bytes small Linux/x86 shellcode that has a MMX stub decoder that dynamically decodes the payload in memory. The FPU GetPC technique is used to determine the offset from EIP dynamically in running memory. Once decoded. this shellcode adds the user 'ctl' with the password 'ctl' to the /etc/passwd file with the UID and GID of 0 (root). This shellcode uses legacy passwd functionality. Therefore the /etc/shadow file does not need to be accessed or modified.




ux

Gentoo Linux Security Advisory 202003-59

Gentoo Linux Security Advisory 202003-59 - Multiple vulnerabilities have been found in libvpx, the worst of which could result in the execution of arbitrary code. Versions less than 1.8.1 are affected.




ux

Gentoo Linux Security Advisory 202003-60

Gentoo Linux Security Advisory 202003-60 - Multiple vulnerabilities have been found in QtCore, the worst of which could result in the execution of arbitrary code. Versions less than 5.13.2-r2 are affected.




ux

Gentoo Linux Security Advisory 202003-61

Gentoo Linux Security Advisory 202003-61 - A vulnerability in Adobe Flash Player might allow remote attackers to execute arbitrary code. Versions less than 32.0.0.330 are affected.