Aggregator
CVE-2018-1000050 | Sean Barrett stb_vorbis up to 1.12 Decoding memory corruption (Nessus ID 255116)
CVE-2019-11008 | GraphicsMagick 1.4 snapshot-20190322 Q8 coders/xwd.c WriteXWDImage memory corruption (USN-4207-1 / Nessus ID 255113)
CVE-2019-11473 | GraphicsMagick 1.3.31 XWD Image File coders/xwd.c out-of-bounds (USN-4207-1 / Nessus ID 255113)
CVE-2018-15869 | Amazon Web Services CLI 1.15.85 Image 7pk security (ID 6584 / Nessus ID 255117)
Sarcoma
You must login to view this content
MongoDB ужесточил правила — Microsoft ответила. DocumentDB теперь в Linux Foundation
«Тихий DDoS» от ИИ-ботов: ставим квоты и кэш, чтобы счета за инфраструктуру не росли
Critical Chrome Use-After-Free Flaw Enables Arbitrary Code Execution
Google has released an urgent security update for the Chrome Stable channel to address a critical use-after-free vulnerability in the ANGLE graphics library that could allow attackers to execute arbitrary code on vulnerable systems. The fixes arrive as part of Chrome Stable versions 139.0.7258.154/.155 on Windows and macOS, and 139.0.7258.154 on Linux. Users are advised to update immediately, as the patch […]
The post Critical Chrome Use-After-Free Flaw Enables Arbitrary Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-57797 | PFU ScanSnap Manager Installer prior 6.5L61 privileges assignment
CVE-2025-9529 | Campcodes Payroll Management System 1.0 /index.php include page file inclusion
Submit #635551: Campcodes Payroll Management System v1.0 Improper Control of Filename for Include/Require Statement in PH [Accepted]
售票开启|GEEKCON 2025 上海站早鸟票限时抢购中
假冒macOS欺骗用户安装新型Shamos信息窃取器
售票开启|GEEKCON 2025 上海站早鸟票限时抢购中
假冒macOS欺骗用户安装新型Shamos信息窃取器
AI Security Map: Linking AI vulnerabilities to real-world impact
A single prompt injection in a customer-facing chatbot can leak sensitive data, damage trust, and draw regulatory scrutiny in hours. The technical breach is only the first step. The real risk comes from how quickly one weakness in an AI system can trigger a chain of business, legal, and societal impacts. Researchers at KDDI Research have developed the AI Security Map to connect those dots, showing how technical failures lead to harm that reaches far … More →
The post AI Security Map: Linking AI vulnerabilities to real-world impact appeared first on Help Net Security.
African Law Enforcement Agencies Nab Cybercrime Syndicates
От IBM PC 5150 до Celeron Mendocino. Вышел 86Box 5.0 с менеджером виртуальных машин
Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances
A sophisticated data exfiltration campaign targeting corporate Salesforce instances has exposed sensitive information from multiple organizations through compromised OAuth tokens associated with the Salesloft Drift third-party application. The threat actor, designated as UNC6395, systematically harvested credentials and sensitive data between August 8-18, 2025, demonstrating advanced operational security awareness while executing SOQL queries across numerous Salesforce […]
The post Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances appeared first on Cyber Security News.