Microsoft Edge Chakra JIT Failed RegexHelper::StringReplace Call

Microsoft Edge Chakra JIT Failed RegexHelper::StringReplace Call

The “String.prototype.replace” method can be inlined in the JIT process. So in the method, all the calls which may break the JIT assumptions must be invoked with updating “ImplicitCallFlags”. But “RegexHelper::StringReplace” calls the replace function without updating the flag. Therefore it fails to detect if a user function was called. Source: Microsoft Edge Chakra JIT […]

The post Microsoft Edge Chakra JIT Failed RegexHelper::StringReplace Call appeared first on MondoUnix.

Shadowsocks Log Manipulation / Command Execution

Shadowsocks Log Manipulation / Command Execution

Several issues have been identified, which allow attackers to manipulate log files, execute commands and to brute force Shadowsocks with enabled autoban.py brute force detection. Brute force detection from autoban.py does not work with suggested tail command. The key of captured Shadowsocks traffic can be brute forced. The latest commit 2ab8c6b on Sep 6, 2017 […]

The post Shadowsocks Log Manipulation / Command Execution appeared first on MondoUnix.

Opentext Documentum Content Server File Hijack / Privilege Escalation

Opentext Documentum Content Server File Hijack / Privilege Escalation

Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) does not properly validate input of the PUT_FILE RPC command which allows any authenticated user to hijack arbitrary file from the Content Server filesystem. Because some files on the Content Server filesystem are security-sensitive this security flaw leads to privilege escalation. Source: Opentext Documentum […]

The post Opentext Documentum Content Server File Hijack / Privilege Escalation appeared first on MondoUnix.