Public exploits are available for critical ImageMagick vulnerabilities, increasing the risk to websites that use the open source image-processing software.
Tag Archives: remote code execution
Hacker Installed a Secret Backdoor On Facebook Server to Steal Passwords
How to Hack Facebook?
That’s the most commonly asked question during this decade.
It’s a hacker dream to hack Facebook website for earning bug bounty or for any malicious purpose.
Facebook security team recently found that someone, probably a blackhat hacker with malicious intent, has breached into its server and installed a backdoor that was configured to steal Facebook employees’ login
Core Windows Utility Can Be Used to Bypass AppLocker
A researcher has discovered that Windows’ Regsvr32 can be used to download and run JavaScript and VBScript remotely from the Internet, bypassing AppLocker’s whitelisting protections.
Moxa Won’t Patch Publicly Disclosed Flaws Until August
A number of publicly disclosed vulnerabilities in Moxa networking gear won’t be patched until August, if at all, according to ICS-CERT.
Remotely Exploitable Bug in Truecaller Puts Over 100 Million Users at Risk
Security researchers have discovered a remotely exploitable vulnerability in Called ID app “Truecaller” that could expose personal details of Millions of its users.
Truecaller is a popular service that claims to “search and identify any phone number,” as well as helps users block incoming calls or SMSes from phone numbers categorized as spammers and telemarketers.
The service has mobile
Flash Player Update Patches 18 Remote Code Execution Flaws
Adobe today released a new version of Flash Player that patches 18 vulnerabilities, all of which can result in remote code execution attacks.
Drupal Update Fixes 10 Vulnerabilities, One Critical
Drupal addressed 10 vulnerabilities in the CMS this week, including a critical access bypass issue and another issue that could lead to remote code execution.
Critical glibc Flaw Puts Linux Machines and Apps at Risk (Patch Immediately)
A highly critical vulnerability has been uncovered in the GNU C Library (glibc), a key component of most Linux distributions, that leaves nearly all Linux machines, thousands of apps and electronic devices vulnerable to hackers that can take full control over them.
How Does the Flaw Work?
Affected Software and Devices
- Virtually all distributions of Linux.
- Programming languages such as the Python, PHP, and Ruby on Rails.
- Many others that use Linux code to lookup the numerical IP address of an Internet domain.
- Most Bitcoin software is reportedly vulnerable, too.
Who are Not Affected
Where glibc went Wrong
“glibc reserves 2048 bytes in the stack through alloca() for the DNS answer at _nss_dns_gethostbyname4_r() for hosting responses to a DNS query. Later on, at send_dg() and send_vc(), if the response is larger than 2048 bytes, a new buffer is allocated from the heap and all the information (buffer pointer, new buffer size and response size) is updated.”
“Under certain conditions a mismatch between the stack buffer and the new heap allocation will happen. The final effect is that the stack buffer will be used to store the DNS response, even though the response is larger than the stack buffer and a heap buffer was allocated. This behavior leads to the stack buffer overflow.”
Proof-of-Concept Exploit Released
Patch glibc Vulnerability
All Versions of Windows affected by Critical Security Vulnerability
Microsoft has released 13 security bulletins, six of which are considered to be critical, resolving a total of 41 security vulnerabilities in its software this month.
Every Windows version Affected:
One of the critical vulnerabilities affects all supported version of Windows, including Microsoft’s newest Windows 10 operating system, as well as Windows Server 2016 Tech Preview 4.
The
Critical Flaws Found in NETGEAR Network Management System
Netgear, one of the most popular router manufacturers, has been vulnerable to two different flaws that could allow hackers to compromise your corporate network and connected devices.
Reported critical vulnerabilities reside in the Netgear’s ProSafe NMS300 Model (Network Management System) – a centralized and comprehensive management application for network administrators that enables them