February 1st, 2024 | ๐
iSpeech Qualys Security Advisory For the algorithm lovers: Nontransitive comparison functions lead toout-of-bounds read & write in glibc's qsort() ========================================================================Contents========================================================================
January 31st, 2024 | ๐
TTS Qualys Security Advisory CVE-2023-6246: Heap-based buffer overflow in the glibc's syslog() ========================================================================Contents======================================================================== SummaryAnalysisProof of conceptExploitationAcknowledgmentsTimeline ========================================================================Summary======================================================================== We discovered a
January 31st, 2024 | ๐
https://www.ispeech.org ๎ Jan 31, 2024๎ NewsroomVulnerability / Endpoint Security Malicious local attackers can obtain full root access on Linux machines by taking
December 21st, 2023 | ๐
iSpeech.orgA buffer overflow exists in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. It has
October 6th, 2023 | ๐
iSpeech Qualys Security Advisory Looney Tunables: Local Privilege Escalation in the glibc's ld.so(CVE-2023-4911) ========================================================================Contents======================================================================== SummaryAnalysisProof of conceptExploitationAcknowledgmentsTimeline ========================================================================Summary======================================================================== The GNU
January 29th, 2021 | ๐
https://www.ispeech.org/text.to.speech glibc: assertion during character conversion I'm just creating a bug for future reference, I've already reported this issue upstream
October 17th, 2019 | ๐
https://www.ispeech.orgA vulnerability was found in Oracle Fujitsu M10-1, Fujitsu M10-4, Fujitsu M10-4S, Fujitsu M12-1, Fujitsu M12-2 and Fujitsu M12-2S Servers.
January 18th, 2019 | ๐
iSpeech.org The EU has funded the FOSSA Bug Bounty Programm with approx. 1 million dollars. Now is the change to
February 9th, 2015 | ๐
https://www.ispeech.org Researchers at Veracode this week published their look at Ghost and determined that like Bash, gethostbyname is relatively everywhere.
January 31st, 2015 | ๐
iSpeechSo the big panic in the past week or so has been about this GHOST vulnerability in glibc which under
January 30th, 2015 | ๐
tts After the disclosure of extremely critical GHOST vulnerability in the GNU C library (glibc) โ a widely used component
January 27th, 2015 | ๐
https://www.ispeech.org A critical vulnerability has been found in glibc, the GNU C library, that affects all Linux systems dating back
Gloss