Aggregator
CVE-2025-2723 | GNOME libgsf up to 1.14.53 gsf_property_settings_collec n_alloced_params heap-based overflow
CVE-2025-2722 | GNOME libgsf up to 1.14.53 gsf_prop_settings_collect_va n_alloced_params heap-based overflow
CVE-2025-2721 | GNOME libgsf up to 1.14.53 gsf_base64_encode_simple size_t heap-based overflow
CVE-2025-2720 | GNOME libgsf up to 1.14.53 gsf_base64_encode_simple size uninitialized variable
Submit #520184: Open Source libgsf <=1.14.53 Out-of-Bounds Read (sorting_key_copy) [Accepted]
Submit #520183: Open Source libgsf <=1.14.53 Integer Overflow -> Heap Overflow (gsf_property_settings_collec) [Accepted]
Submit #520182: Open Source libgsf <=1.14.53 Integer Overflow -> Heap Overflow (gsf_prop_settings_collect_va) [Accepted]
Submit #520181: Open Source libgsf <=1.14.53 Integer Overflow -> Heap Overflow (gsf_base64_encode_simple) [Accepted]
Submit #520180: Open Source libgsf <=1.14.53 Uninitalized Heap Read (gsf_base64_encode_simple) [Accepted]
Privileged access workstations: introducing our new set of principles
CleanStack: Dual-Stack Solution to Defend Against Memory Corruption Attacks
CleanStack is a novel stack protection mechanism designed to combat memory corruption attacks, which have long been a significant threat to software systems. These attacks exploit vulnerabilities in low-level languages like C/C++ to execute arbitrary code or manipulate memory operations. CleanStack addresses these issues by introducing a dual-stack system that isolates and randomizes stack objects […]
The post CleanStack: Dual-Stack Solution to Defend Against Memory Corruption Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
灯塔自动化扫描工具
灯塔自动化扫描工具
Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence
A recent cyber espionage operation by a China-nexus threat actor, dubbed “Weaver Ant,” has been uncovered by Sygnia, a cybersecurity firm. This sophisticated threat actor targeted a major telecommunications company in Asia, utilizing web shells and tunneling techniques to maintain persistent access and facilitate espionage. The operation highlights the evolving tactics of state-sponsored groups in […]
The post Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-5687 | Mozilla Firefox up to 126 on Android Header
CVE-2024-5695 | Mozilla Firefox up to 126 Probabilistic Heap Checker memory corruption
CVE-2024-5694 | Mozilla Firefox up to 126 Javascript Engine use after free
Разные зарплаты ‒ одна работа: Google выложит $28 млн за дискриминацию сотрудников
24th March – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 24th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Municipalities in four US states experienced cyberattacks that disrupted services for county offices, courts, and schools. Cleveland Municipal Court was hit by Qilin ransomware attack, forcing employees offline and delaying trials, while […]
The post 24th March – Threat Intelligence Report appeared first on Check Point Research.