Aggregator
CVE-2023-20616 | MediaTek MT8797 ion out-of-bounds (ALPS07560720 / EUVD-2023-24795)
Medusa Blog
You must login to view this content
CVE-2025-48385 | Microsoft Visual Studio Git injection (Nessus ID 241644 / WID-SEC-2025-1485)
CVE-2025-48386 | Microsoft Visual Studio Git privilege escalation (Nessus ID 241644 / WID-SEC-2025-1485)
CVE-2025-46835 | j6t git-gui up to 2.50.0 argument injection (GHSA-xfx7-68v4-v8fg / EUVD-2025-21002)
CVE-2025-46835 | Microsoft Visual Studio Git privilege escalation (EUVD-2025-21002 / Nessus ID 241644)
CVE-2025-48384 | Microsoft Visual Studio Git symlink (EUVD-2025-20677 / Nessus ID 241644)
CVE-2025-27614 | j6t gitk up to 2.50.0 os command injection (GHSA-g4v5-fjv9-mhhc / EUVD-2025-21004)
Citrix fixes critical NetScaler RCE flaw exploited in zero-day attacks
CVE-2018-15472 | GitLab Community Edition/Enterprise Edition up to 11.1.6/11.2.3/11.3.0 Diff Formatter denial of service (Nessus ID 255155)
CVE-2015-9275 | arc 5.21q Archive File Path path traversal (Nessus ID 255160)
CVE-2017-9104 | adns up to 1.5.1 Compression resource consumption (FEDORA-2020-530188bf36 / Nessus ID 255159)
CVE-2015-1192 | kgb 1.0b4 path traversal (Nessus ID 255164 / BID-72111)
CVE-2019-14872 | Newlib libc Library up to 3.2.x _dtoa_r Return Value null pointer dereference (Nessus ID 255165)
CVE-2021-45930 | Qt up to 6.2.1 Qt SVG growAppend out-of-bounds write (Nessus ID 255205)
Silk Typhoon hackers hijack network captive portals in diplomat attacks
Citrix NetScaler customers hit by third actively exploited zero-day vulnerability since June
The vendor, which has been widely targeted, said the memory-overflow vulnerability can result in remote-code execution or denial of service.
The post Citrix NetScaler customers hit by third actively exploited zero-day vulnerability since June appeared first on CyberScoop.
APT36 Targets Indian BOSS Linux Using Weaponized .desktop Shortcut Files
Researchers have unveiled ONEFLIP, a novel inference-time backdoor attack that compromises full-precision deep neural networks (DNNs) by flipping just one bit in the model’s weights, marking a significant escalation in the practicality of hardware-based attacks on AI systems. Unlike traditional backdoor methods that require poisoning training data or manipulating the training process, ONEFLIP operates during […]
The post APT36 Targets Indian BOSS Linux Using Weaponized .desktop Shortcut Files appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.