Aggregator
CVE-2025-7246 | CADImage Plugin on IrfanView DWG File Parser memory corruption
CVE-2025-7252 | CADImage Plugin on IrfanView DWG File Parser out-of-bounds
CVE-2025-7254 | CADImage Plugin on IrfanView DXF File Parser memory corruption
CVE-2025-7253 | CADImage Plugin on IrfanView DWG File Parser memory corruption
CVE-2025-7256 | CADImage Plugin on IrfanView DXF File Parser memory corruption
CVE-2025-7255 | CADImage Plugin on IrfanView DWG File Parser memory corruption
CVE-2025-7257 | CADImage Plugin on IrfanView DXF File Parser memory corruption
CVE-2025-7258 | CADImage Plugin on IrfanView DWG File Parser out-of-bounds write
CVE-2025-7251 | CADImage Plugin on IrfanView DWG File Parser out-of-bounds
CVE-2025-7250 | CADImage Plugin on IrfanView DWG File Parser out-of-bounds (EUVD-2025-22158)
火狐浏览器(国际版)将官方网站从Mozilla.org迁移到Firefox.com
绑定微信功能挖掘的 0-Click 任意账号接管漏洞
绑定微信功能挖掘的 0-Click 任意账号接管漏洞
Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers’ npm Tokens
A sophisticated supply chain attack has compromised several widely-used npm packages, including eslint-config-prettier and eslint-plugin-prettier, after threat actors successfully stole maintainer authentication tokens through a targeted phishing campaign. The attack leveraged a typosquatted domain, npnjs.com, designed to mimic the legitimate npmjs.org site and harvest developer credentials through convincing phishing emails. The malicious campaign represents a […]
The post Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers’ npm Tokens appeared first on Cyber Security News.
CVE-2025-7241 | CADImage Plugin on IrfanView DWG File Parser memory corruption
Coercer: automatically coerce a Windows server to authenticate on an arbitrary machine
Coercer A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through many methods. Features Automatically detects open SMB pipes on the remote machine. Calls one by one all...
The post Coercer: automatically coerce a Windows server to authenticate on an arbitrary machine appeared first on Penetration Testing Tools.