Overwolf 1-Click Remote Code Execution - CVE-2021-33501 Security News & Discussion |
- Overwolf 1-Click Remote Code Execution - CVE-2021-33501
- Trivial file transfer between separate VMs executed on the same host by modulating the CPU load. This is intended as an illustration for the M1RACLES discussion, to support the point that the M1's system register does not add new means of data exchange and is not a real vulnerability
- .NET Managed Injector Library
- Analysis report of the Facefish rootkit
- CVE-2021-21985 (another NSE quick checker)
- “Half-Double”: Next-Row-Over Assisted Rowhammer: demonstrates a new attack that bypasses row hammer defenses. It is based on a discovery of weak coupling between two rows that are not immediately adjacent to each other but one row removed.
- Playing with ImageTragick like it's 2016
- HardenedVault's whitepaper on building the digital bunker
- Write-up: runc mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs (CVE-2021-30465)
- Reverse engineered Opera VPN client
Overwolf 1-Click Remote Code Execution - CVE-2021-33501 Posted: 31 May 2021 08:34 AM PDT |
Posted: 30 May 2021 02:11 PM PDT |
Posted: 31 May 2021 03:56 AM PDT |
Analysis report of the Facefish rootkit Posted: 31 May 2021 12:11 AM PDT |
CVE-2021-21985 (another NSE quick checker) Posted: 30 May 2021 10:54 PM PDT |
Posted: 30 May 2021 02:08 AM PDT |
Playing with ImageTragick like it's 2016 Posted: 30 May 2021 06:56 PM PDT |
HardenedVault's whitepaper on building the digital bunker Posted: 30 May 2021 11:28 PM PDT |
Posted: 30 May 2021 10:52 AM PDT |
Reverse engineered Opera VPN client Posted: 29 May 2021 01:27 PM PDT |
You are subscribed to email updates from /r/netsec - Information Security News & Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment