Skip to content

Linux Security Blog

How Hackers Work

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • Python Series
    • Part I
    • Part II
  • About

Category: Patches

Android Security…

How the CopyCat malware infected Android devices around the world

7 Jul 20177 Jul 2017
Check Point researchers identified a mobile malware that infected 14 million Android devices, rooting approximately 8 million of them, and earning the hackers behind the campaign approximately $1.5 million in…
Patches

Google creates fix for zero-day kernel flaw, effect on Android is greatly exaggerated

22 Jan 2016
After being caught off guard by the disclosure of a serious flaw in the Linux kernel this week, Google has quickly developed a patch for Android and shared it with…
Attacks…

Hackers spent at least a year spying on Mozilla

5 Sep 20155 Sep 2015
Hackers have known about unpublicized and unpatched critical security holes in the Firefox web browser for a year or more – all by invading Mozilla's systems. The Mozilla Foundation admitted…
Patches

Google Chrome 45 Security Patches, Bug Bounty Awards

3 Sep 20154 Sep 2015
Tuesday turned out to be a busy day for browser makers. The three major vendors in the space—Google; Mozilla; and Microsoft—joined arms and announced their intent to stop support for…

RSS ls -a /Zer0Days

  • [webapps] Camaleon CMS v2.7.0 - Server-Side Template Injection (SSTI)
  • [webapps] SCM Manager 1.60 - Cross-Site Scripting Stored (Authenticated)
  • [remote] Seagate Central Storage 2015.0916 - Unauthenticated Remote Command Execution (Metasploit)
  • [webapps] Ulicms 2023.1 - create admin user via mass assignment
  • [webapps] Zenphoto 1.6 - Multiple stored XSS
  • [webapps] WBCE CMS 1.6.1 - Multiple Stored Cross-Site Scripting (XSS)
  • [local] Filmora 12 version ( Build 1.0.0.7) - Unquoted Service Paths Privilege Escalation
  • [webapps] Service Provider Management System v1.0 - SQL Injection
  • [webapps] Roxy WI v6.1.0.0 - Unauthenticated Remote Code Execution (RCE) via subprocess_execute
  • [webapps] FusionInvoice 2023-1.0 - Stored XSS (Cross-Site Scripting)

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • An error has occurred; the feed is probably down. Try again later.

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,441 other subscribers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

dark92i (@dark92i) on The Hidden Wiki
Foster Eli on Best Darkweb Links
crypstalk21 on Securing Your Crypto Wallet
kioptrix vm on PenTesting: Gaining Root Privi…
Johnny Dickman (@Dar… on The Darknet 2019
XXS Attack – P… on Payload in PDF

ls -a -v /community

ls /MostVisited

  • Best Darkweb Links
    Best Darkweb Links
  • Payload in PDF
    Payload in PDF
  • Crack WPA Handshake using Aircrack with Kali Linux
    Crack WPA Handshake using Aircrack with Kali Linux
  • Find Vulnerable Devices On The Internet With Shodan
    Find Vulnerable Devices On The Internet With Shodan
  • How To Use Netcat to Establish and Test TCP and UDP Connections
    How To Use Netcat to Establish and Test TCP and UDP Connections
  • OWASP Security Shepherd- Session Management Challenge One - Solution - LSB
    OWASP Security Shepherd- Session Management Challenge One - Solution - LSB
  • Write a Ping Sweeper in 4 Lines of Bash
    Write a Ping Sweeper in 4 Lines of Bash
  • Set Up A Penetration Testing Lab  Easily With Vagrant
    Set Up A Penetration Testing Lab Easily With Vagrant
  • PenTesting: Gaining Root Privileges on Kioptrix
    PenTesting: Gaining Root Privileges on Kioptrix
  • Import VirtualBox Images to GNS3
    Import VirtualBox Images to GNS3

ls /Archives

Follow Linux Security Blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Linux Security Blog
    • Join 272 other followers
    • Already have a WordPress.com account? Log in now.
    • Linux Security Blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar