Aggregator
CVE-2022-2520 | libtiff 4.4.0rc1 tiffcrop.c rotateImage buffer size (Issue 424 / Nessus ID 240052)
CVE-2022-3626 | LibTIFF 4.4.0 TIFF File libtiff/tif_unix.c _TIFFmemset out-of-bounds write (Issue 426 / Nessus ID 240052)
CVE-2022-3627 | LibTIFF 4.4.0 TIFF File libtiff/tif_unix.c _TIFFmemcpy out-of-bounds write (ID 411 / Nessus ID 240052)
CVE-2022-40090 | libtiff up to 4.3.x TIFF File TIFFReadDirectory denial of service (Issue 455 / Nessus ID 240052)
CVE-2022-3598 | LibTIFF 4.4.0 TIFF File tools/tiffcrop.c extractContigSamplesShifted24bits out-of-bounds write (Issue 435 / Nessus ID 240052)
CVE-2022-3570 | LibTIFF 4.4.0 TIFF File tiffcrop.c out-of-bounds (ID 381 / Nessus ID 240052)
CVE-2022-3599 | LibTIFF 4.4.0 TIFF File tools/tiffcrop.c writeSingleSection out-of-bounds (Issue 398 / Nessus ID 240052)
Akira
You must login to view this content
Defensie versterkt maritieme slagkracht met Tomahawks
Hackers Manipulate Search Engines to Push Malicious Sites
A new wave of cybercrime is exploiting the very backbone of internet trust: search engines. Recent research by Netcraft has exposed a sophisticated and organized SEO poisoning operation, where hackers manipulate search engine algorithms to push malicious websites to the top of search results. At the heart of this campaign is a platform known as […]
The post Hackers Manipulate Search Engines to Push Malicious Sites appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Novel TokenBreak Attack Method Can Bypass LLM Security Features
Researchers with HiddenLayers uncovered a new vulnerability in LLMs called TokenBreak, which could enable an attacker to get around content moderation features in many models simply by adding a few characters to words in a prompt.
The post Novel TokenBreak Attack Method Can Bypass LLM Security Features appeared first on Security Boulevard.
Обычное фото? Скорее портал в ад. Katz Stealer маскируется лучше, чем баги перед релизом
CISA Releases Five Industrial Control Systems Advisories
CISA released five Industrial Control Systems (ICS) advisories on June 17, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-168-01 Siemens Mendix Studio Pro
- ICSA-25-168-02 LS Electric GMWin 4
- ICSA-25-168-04 Fuji Electric Smart Editor
- ICSA-25-168-05 Dover Fueling Solutions ProGauge MagLink LX Consoles
- ICSA-24-347-10 Siemens SENTRON Powercenter 1000 (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2023-0386 Linux Kernel Improper Ownership Management Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
How Azul and Moderne Are Boosting Java Developer Productivity
Moderne and Azul are helping development teams identify, remove, and refactor unused and dead code to improve Java developer productivity.
The post How Azul and Moderne Are Boosting Java Developer Productivity appeared first on Azul | Better Java Performance, Superior Java Support.
The post How Azul and Moderne Are Boosting Java Developer Productivity appeared first on Security Boulevard.
CVE-2025-40674 | osCommerce 4 /watch/en/about-us cross site scripting (EUVD-2025-18487)
【复现】泛微E-cology9 前台SQL注入漏洞风险通告
Tegenstander de baas met nieuwe scheepsbewapening
Sumsub Device Intelligence offers protection against identity threats
Sumsub is expanding its Fraud Prevention solution with advanced Device Intelligence, enhanced by the Fingerprint platform. Designed to identify threats before they escalate, Device Intelligence offers real-time insights with accuracy into user integrity by analyzing device behavior and network-level data beyond basic IP tracking. This proactive layer of security empowers companies to stop transaction fraud, detect and block bots, prevent multi-accounting and account takeovers, and significantly reduce unnecessary KYC costs — all without disrupting the user … More →
The post Sumsub Device Intelligence offers protection against identity threats appeared first on Help Net Security.