Aggregator
От обычного пользователя до root за секунды. Критическая брешь в Linux обесценивает любую защиту
CVE-2001-1407 | Mozilla Bugzilla up to 2.14 Security Check privileges management (ID 86245 / XFDB-10479)
CVE-2001-1433 | Cherokee httpd up to 0.2.6 Port Binding privileges management (VU#245795 / Nessus ID 15622)
CVE-2001-1442 | ISC INN up to 2.2.3 innfeed memory corruption (VU#943536 / EDB-20777)
CVE-2001-1458 | Novell GroupWise 5.5/6.0 webacc?user.html path traversal (VU#341539 / Nessus ID 10789)
Cisco IOS/XE Vulnerability Allows Unauthorized Access to Confidential Data
Cisco released an advisory describing a high-severity vulnerability (CVE-2025-20160) in its IOS and IOS XE platforms. The flaw stems from improper validation of the TACACS+ shared secret configuration. When TACACS+ is enabled but no secret is set, remote attackers or machine-in-the-middle adversaries can intercept or manipulate authentication messages. Successful exploitation grants unauthorized access to confidential […]
The post Cisco IOS/XE Vulnerability Allows Unauthorized Access to Confidential Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
ZendTo Vulnerability Let Attackers Bypass Security Controls and Access Sensitive Data
A critical path traversal flaw in ZendTo has been assigned CVE-2025-34508 researchers discovered that versions 6.15–7 and prior enable authenticated users to manipulate file paths and retrieve sensitive data from the host system. This issue underscores the persistent risk in web-based file transfer applications. Path Traversal Vulnerability (CVE-2025-34508) ZendTo is a PHP-driven dropoff or pickup […]
The post ZendTo Vulnerability Let Attackers Bypass Security Controls and Access Sensitive Data appeared first on Cyber Security News.
CVE-2019-9041 | ZZZCMS zzzphp 1.6.1 inc/zzz_template.php parserIfLabel code injection (EDB-46454)
CVE-2019-14430 | YouPHPTube up to 7.2 AuditTable.php sql injection (EDB-47294)
CVE-2019-18951 | SibSoft Xfilesharing up to 2.5.1 tmpl path traversal (ID 155324 / EDB-47659)
CVE-2019-19844 | Django up to 1.11.26/2.2.8/3.0.0 Password Reset password recovery (ID 155872 / EDB-47879)
CVE-2019-9879 | WPGraphQL Plugin 0.2.3 on WordPress User Registration missing authentication (ID 153025 / EDB-46886)
SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes
SetupHijack, an open-source research utility, has emerged as a powerful method for red teaming and security research by targeting race conditions and insecure file handling within Windows installer and update mechanisms. By polling world-writable directories such as %TEMP%, %APPDATA%, and %USERPROFILE%\Downloads, the tool intercepts installer‐dropped payloads before they execute with elevated privileges, enabling full SYSTEM […]
The post SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes appeared first on Cyber Security News.
New Malicious Rust Crates Impersonate fast_log to Steal Solana and Ethereum Wallet Keys
A pair of malicious Rust crates masquerading as the popular fast_log library have been uncovered, harvesting private Solana and Ethereum keys from developers’ environments. The impostor crates include legitimate-looking logging functionality to evade detection, while a hidden routine scans source files for wallet keys and exfiltrates them to a hardcoded command-and-control (C2) endpoint. Between them, […]
The post New Malicious Rust Crates Impersonate fast_log to Steal Solana and Ethereum Wallet Keys appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
AI 到底会不会做生意?1688 的答案让人惊喜
datagear 之JDBC奇淫技巧-替换数据库驱动到 rce
ZendTo Flaw Lets Attackers Bypass Security Controls to Access Sensitive Data
A critical vulnerability in the popular file-sharing tool ZendTo allows authenticated users to traverse system paths and access or modify sensitive files belonging to other users. The flaw, tracked as CVE-2025-34508, affects ZendTo versions 6.15-7 and earlier. An attacker can exploit this issue to read server logs, user data, or even critical application files. ZendTo […]
The post ZendTo Flaw Lets Attackers Bypass Security Controls to Access Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New BRICKSTORM Stealthy Backdoor Attacking Tech and Legal Sectors
BRICKSTORM has surfaced as a highly evasive backdoor targeting organizations within the technology and legal industries, exploiting trust relationships to infiltrate critical networks. First detected in mid-2025, this malware leverages multi-stage loaders and covert communication channels to avoid detection. Early victims reported unusual latency in remote desktop sessions, prompting deeper forensic investigations. As the campaign […]
The post New BRICKSTORM Stealthy Backdoor Attacking Tech and Legal Sectors appeared first on Cyber Security News.