Aggregator
马斯克威胁起诉广告商取得部分成效
CVE-2025-22240 | VMware SALT prior 3006.12/3007.4 find_file permission (EUVD-2025-18250)
CVE-2024-38822 | VMware SALT prior 3006.12/3007.4 a one-way hash with a predictable salt (EUVD-2024-54685)
CVE-2024-38823 | VMware SALT prior 3006.12/3007.4 authentication replay (EUVD-2024-54684)
CVE-2025-4227 | Palo Alto GlobalProtect App up to 6.0.0/6.1.0/6.2.8-h1/6.3.2-565/11.2.6 Endpoint Traffic Policy Enforcement cleartext transmission (EUVD-2025-18244)
CVE-2024-38825 | VMware SALT prior 3006.12/3007.4 salt.auth.pki Password certificate validation (EUVD-2024-54683)
TokenBreak Exploit Tricks AI Models Using Minimal Input Changes
HiddenLayer’s security research team has uncovered TokenBreak, a novel attack technique that bypasses AI text classification models by exploiting tokenization strategies. This vulnerability affects models designed to detect malicious inputs like prompt injection, spam, and toxic content, leaving protected systems exposed to attacks they were meant to prevent. Technical Breakdown of TokenBreak According to the […]
The post TokenBreak Exploit Tricks AI Models Using Minimal Input Changes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
WebDAV Remote Code Execution 0-Day Actively Exploited — PoC Released
A critical zero-day vulnerability in Microsoft’s Web Distributed Authoring and Versioning (WebDAV) protocol, tracked as CVE-2025-33053, has been actively exploited by the advanced persistent threat (APT) group Stealth Falcon since March 2025. The flaw, patched in June’s Patch Tuesday, enables remote code execution (RCE) via manipulated .url shortcut files and has been linked to attacks […]
The post WebDAV Remote Code Execution 0-Day Actively Exploited — PoC Released appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.