You are here |
scarybeastsecurity.blogspot.com | ||
| | | |
landave.io
|
|
| | | | Blog about anti-virus software vulnerabilities. | |
| | | |
www.ambionics.io
|
|
| | | | A few months ago, I stumbled upon a 24 years old buffer overflow in the glibc, the base library for linux programs. Despite being reachable in multiple well-known libraries or executables, it proved rarely exploitable - while it didn't provide much leeway, it required hard-to-achieve preconditions. Looking for targets lead mainly to disappointment. On PHP however, the bug shone, and proved useful in exploiting its engine in two different ways. | |
| | | |
www.ambionics.io
|
|
| | | | In this blog post, we will explore a new way of exploiting the vulnerability on PHP, using direct calls to iconv(), and illustrate the vulnerability by targeting Roundcube, a popular PHP webmail. | |
| | | |
blog.phylum.io
|
|
| | Headed to Black Hat USA? Come talk to Phylum! Software supply chains are complicated. In this complicated web of globally distributed software, attackers can lie in wait, releasing malicious software libraries to unsuspecting developers and organizations. It is prohibitively difficult to manually scan and analyze every package a given organization |