Google Chrome V8 – Turbofan JSCallReducer::ReduceArrayIndexOfIncludes Out-of-Bounds Read/Write
from Exploit-DB.com RSS Feed http://bit.ly/2EacU9u
via IFTTT
Google Chrome V8 – Turbofan JSCallReducer::ReduceArrayIndexOfIncludes Out-of-Bounds Read/Write
from Exploit-DB.com RSS Feed http://bit.ly/2EacU9u
via IFTTT
XOOPS 2.5.9 – SQL Injection
from Exploit-DB.com RSS Feed http://bit.ly/2WHJTcv
via IFTTT
SOCA Access Control System 180612 – Cross-Site Request Forgery (Add Admin)
from Exploit-DB.com RSS Feed http://bit.ly/2E8iLfv
via IFTTT
SOCA Access Control System 180612 – SQL Injection
from Exploit-DB.com RSS Feed http://bit.ly/2WPp13n
via IFTTT
SOCA Access Control System 180612 – Information Disclosure
from Exploit-DB.com RSS Feed http://bit.ly/2E8iMQB
via IFTTT
DNSS 2.1.8 – Denial of Service (PoC)
from Exploit-DB.com RSS Feed http://bit.ly/2WKufxc
via IFTTT
SpotMSN 2.4.6 – Denial of Service (PoC)
from Exploit-DB.com RSS Feed http://bit.ly/2E9SGNf
via IFTTT
Linux/x86 – /sbin/iptables -F Shellcode (43 bytes)
from Exploit-DB.com RSS Feed http://bit.ly/2WO5zUE
via IFTTT
Cyberweapons are dangerous in themselves. Their proliferation makes them much more harmful
NSO Group, an Israeli firm that has risen to a billion-dollar valuation on the strength of the aggressive hacking tools it sells to authoritarian governments across the Arab world, is being sued by lawyers and activists who claim to be victims of its software. One of the lawyers involved in the suit was targeted some weeks ago by mysterious WhatsApp calls to his phone in the middle of the night. When he contacted technical experts, they discovered Pegasus 3, an aggressive virus that can apparently install itself on a phone without the victim taking any action at all. Once installed, it takes control of the device, recording conversations and video. It can destroy the evidence of its own arrival and existence, and control any files on the device. In effect, it turns a smartphone into the perfect spying device, which the victim will carry everywhere with them.
Similar programs are widely available to abusers of all sorts, which is one reason why many domestic violence shelters ban the use of smartphones. But the ones that can easily be bought require some action from the victim, usually a misplaced click, or else a few moments’ access to their phone. The NSO malware targeting WhatsApp is different in that it could install itself without the victim doing anything at all. To discover and exploit the programming mistakes that opened this vulnerability would take years and cost millions of dollars. That is why it’s assumed that only states, or state-backed actors, have the resources to produce them.
from Data and computer security | The Guardian http://bit.ly/2Vo4xNB
via IFTTT

By DAISUKE WAKABAYASHI and KAREN WEISE
Amazon wants to sell ads. Google wants to woo shoppers. Their ambitions are putting the tech giants on a collision course.
Published: May 13, 2019 at 07:00PM
from NYT Technology https://nyti.ms/2VjLJih
via IFTTT