Explore >> Select a destination


You are here

linuxsecurityblog.com
| | xorl.wordpress.com
8.2 parsecs away

Travel
| | This vulnerability was reported by Alasdair MacGregor and it's as simple as this. The mountall(1) utility which is used as a mounting tool for UDEV rules, create rules that are owned by root and world writable! Example: If you read the bug tracking system's comments you'll probably notice Kees Cook's comment who says: Touching this...
| | swordbytes.com
11.9 parsecs away

Travel
| | SwordBytes researchers have identified an Unauthenticated Remote Code Execution (RCE) vulnerability in Overwolf's Client Application by abusing a Reflected Cross-Site Scripting (XSS) issue present in the "overwolfstore://" URL handler. This vulnerability allows remote unauthenticated attackers to execute arbitrary commands on the underlying operating system that hosts Overwolf's Client Application.
| | taeluralexis.com
9.7 parsecs away

Travel
| | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies.
| | www.lookout.com
72.5 parsecs away

Travel
| Based on an analysis of Lookout's security dataset of more than 300 million mobile apps, 220 million mobile devices, and billions of web items, Lookout has authored the Mobile Threat Landscape Report.