A critical security flaw has been reported in GNU C Library. The bug discovered in glibc has been present since 2008. A huge amount of Linux software can be hijacked by miscreants from the other side of the internet. The GNU C Library (glibc) is an essential component of Linux distributions. The researchers at Google and Red Hat […]

Read More →

A critical vulnerability is discovered in GNU C Library (glibc). The GNU C Library, commonly known as glibc, is the GNU Project’s implementation of the C standard library and a core part of the Linux operating system. GNU C Library (glibc) is used in most of the Linux distributions, which is prone to a heap-based […]

Read More →

A new zero-day (CVE-2014-0515) exploit exists in the wild, and is being used to target Flash Player users on the Windows systems. The vulnerability was discovered by Kaspersky Lab in Mid April. There is a buffer overflow vulnerability in the Pixel Bender component which is designed for video and image processing that can be used […]

Read More →

what is a buffer? In general, the term buffer is a temporary storage, a space in the memory used to store the data. Memory Organization: Stack: Contains arguments which are passed to the function and local variables. Heap: Contains the dynamically allocated memory (malloc()). Data: – Initialized data segment: Contains the global, static and constant data. […]

Read More →

SecPod Research Team member (Prabhu S Angadi) has found Denial Of Service Vulnerability in Netmechanica NetDecision HTTP Server. The vulnerability is caused due to improper validation of long malicious HTTP request to web server, which allows remote attackers to crash the service. POC : Download here. More information can be found here. CVE Info : […]

Read More →

SecPod Research Team member (Veerendra G.G) wrote Metasploit module for Freefloat FTP Server APPE Command Overflow Vulnerability. Metasploit : Download here. ## # $Id: freefloat_ftp_apee_cmd.rb 2011-07-19 03:13:45Z veerendragg $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # […]

Read More →