Aggregator
CVE-2024-26801 | Linux Kernel up to 6.7.8 Bluetooth hci_error_reset use after free (Nessus ID 213130 / WID-SEC-2024-0773)
The End of FunkSec: Free Decryptor Released for Ransomware Victims After AI-Assisted Group Goes Dormant
In late 2024, a new ransomware strain named FunkSec emerged on the cybercrime scene. It quickly drew attention due to its aggressive tactics and unconventional implementation. Within a short span, dozens of organizations across...
The post The End of FunkSec: Free Decryptor Released for Ransomware Victims After AI-Assisted Group Goes Dormant appeared first on Penetration Testing Tools.
CVE-2024-26799 | Linux Kernel up to 6.6.20/6.7.8 qcom lpass-cdc-dma.c __lpass_get_dmactl_handle uninitialized pointer (99adc8b4d2f3/d5a7726e6ea6/1382d8b55129 / WID-SEC-2024-0773)
CVE-2024-26800 | Linux Kernel up to 6.6.20/6.7.8 tls crypto_aead_decrypt use after free (81be85353b0f/1ac9fb84bc7e / Nessus ID 210006)
CVE-2024-26796 | Linux Kernel up to 6.6.20/6.7.8 perf ctr_get_width null pointer dereference (e0d17ee872cf/e4f50e85de5a/682dc133f83e / WID-SEC-2024-0773)
CVE-2024-26798 | Linux Kernel up to 5.15.150/6.0/6.1.80/6.6.20/6.7.8 fbcon_do_set_font allocation of resources (WID-SEC-2024-0773)
CVE-2024-26797 | Linux Kernel up to 6.7.8 Error Message map_hw_resources buffer overflow (50a6302cf881/0f8ca019544a / WID-SEC-2024-0773)
SentinelOne Exposes China’s Contractor Network, Linking MSS & Hafnium to 15+ Stealthy Surveillance Patents
A new report from SentinelOne casts a revealing light on a lesser-known yet extensive facet of China’s cyber-espionage apparatus: the contractor infrastructure tied to the threat group Silk Typhoon (also known as Hafnium), which...
The post SentinelOne Exposes China’s Contractor Network, Linking MSS & Hafnium to 15+ Stealthy Surveillance Patents appeared first on Penetration Testing Tools.
Java 反序列化:Apache Commons Collections CC6 利用链深度解析
CVE-2024-26793 | Linux Kernel up to 6.7.8 gtp_newlink use after free (WID-SEC-2024-0773)
CVE-2024-26794 | Linux Kernel up to 6.6.20/6.7.8 btrfs_finish_one_ordered deadlock (d43f8e58f10a/31d07a757c6d / Nessus ID 239841)
CVE-2024-26795 | Linux Kernel up to 5.10.211/5.15.150/6.1.80/6.6.20/6.7.8 vmemmap pfn_to_page out-of-bounds (WID-SEC-2024-0773)
CVE-2024-26791 | Linux Kernel up to 6.7.8 btrfs getname_kernel initialization (Nessus ID 239841 / WID-SEC-2024-0773)
CVE-2024-26792 | Linux Kernel up to 6.1.80/6.6.20/6.7.8 btrfs Filesystem ioctl.c create_snapshot double free (c34adc20b91a/eb3441093aad/c8ab7521665b / WID-SEC-2024-0773)
CVE-2024-26790 | Linux Kernel up to 6.7.8 dmaengine deadlock (WID-SEC-2024-0773)
CVE-2024-26789 | Linux Kernel up to 6.1.80/6.6.20/6.7.8 neonbs out-of-bounds (WID-SEC-2024-0773)
CVE-2024-26787 | Linux Kernel up to 5.10.212/5.15.151/6.1.80/6.6.20/6.7.8 kernel/dma/debug.c mmci_cmd_irq memory corruption (Nessus ID 208000 / WID-SEC-2024-0773)
Microsoft Revamps .NET Bug Bounty Program, Offering Up to $40K for Critical Flaws
Microsoft has announced sweeping enhancements to its vulnerability rewards program for the .NET platform, significantly broadening its scope and increasing compensation for valid discoveries. Security researchers can now earn up to $40,000 for critical...
The post Microsoft Revamps .NET Bug Bounty Program, Offering Up to $40K for Critical Flaws appeared first on Penetration Testing Tools.