Red Hat Security Advisory 2017-1267-01 - The rpcbind utility is a server that converts Remote Procedure Call program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer.
be1bec16ec036a0c7830fe3c4598296e0dca514477d0acaa83c8975bede107bd
InvoicePlane version 1.4.10 suffers from cross site scripting and remote file upload vulnerabilities.
f9f183d34c1ada4b03e2201ee13c0c22983f6fc241dde0d1f28ffdf8da86a993
Simple ASC CMS version 1.2 suffers from a cross site scripting vulnerability.
ca4ddb7798dee2ffb269324504f52117e33584bdf4bd32a0c994b17007d0b4ae
Secunia Research has discovered multiple vulnerabilities in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. An error within the "LoadUvsTable()" function can be exploited to cause a heap-based buffer overflow via a font file containing specially crafted Unicode Variation Sequences tables. An integer overflow error within the "LoadFont()" function can be exploited to cause a heap-based buffer overflow via a font file containing specially crafted Unicode Variation Sequences tables. Successful exploitation of the vulnerabilities allows execution of arbitrary code.
6171c4189358444433b6d183844713287c38ff36227d913c707846f7d310476c
KDE versions 4 and 5 suffer from a KAuth privilege escalation vulnerability.
c554a74a267c52aca3ad742178547b8d2a015c7f0cd8cbcdba5e0a178a1d4c91
HTTrack version 3.x suffers from a stack buffer overflow vulnerability.
2bcbb8ef516f46d2cef284aeb94ca91a4f7f07005d73d65830c62b8a987b454a
WordPress Newsletter Supsystic plugin version 1.1.7 suffers from a cross site scripting vulnerability.
6ecae5adcbf95d5c69fe28fba37fe9ca3a5692158857b6244cf28b09cc5acde3
This brief whitepaper discusses using Powershell to audit Microsoft Azure Cloud.
21b90899799a56e231053bc320dd4854fc4aaa08824b17602b35091584b50445
This Metasploit module exploits a stack-based buffer overflow vulnerability in the web interface of VX Search Enterprise v9.5.12, caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. This Metasploit module has been tested successfully on Windows 7 SP1 x86.
5199a2e5cc5662ac54e66b7146c5c6b94ee41102ab904bac8eb917c52c3801dc
Sure Thing Disc Labeler version 6.2.138.0 suffers from a buffer overflow vulnerability.
8a2edb1c1c0c32c18f1e6f48be84549d2c5b62d50ede9d6deb02b44bd03e7f8d
On Linux, the eBPF verifier log leaks the lower half of a map pointer.
ef14e5eae522759ea9bf260c2ff05b930f1f5f5dadc31821f6ec15b48675f085
This is an issue on MacOS that allows un-entitled root to read kernel frame pointers, which might be useful in combination with a kernel memory corruption bug.
63b9107547c0985f1def098507f1151fbb6c1ccacb4c0d361b420aa17ff32d51
LG has an issue where a malformed OGM file can cause the use of an uninitialized pointer during Vorbis header verification - vorbis_info_clear is called on a vorbis_info structure that has not previously been initialised by a call to vorbis_info_init.
afdfbc4dd8683cc760fb99fd28315f8ac51c68ca61a0fb1a2f850952b9060614
MacOS suffers from a kernel register leak via 32-bit syscall exit.
51f21ee396efaec54ab768abeb7493566d5a0076bced42dd49e3ff6f228e0a09
Broadcom suffers from a host to dongle information leak via wldev_ioctl.
041b12daf028a74772de5874f4f3807b189eefcc5651de1a44fae1f291723a91