Aggregator
CVE-2022-2057 | LibTIFF 4.4.0 tiffcrop divide by zero (Issue 427 / Nessus ID 240052)
CVE-2022-2058 | LibTIFF 4.4.0 tiffcrop divide by zero (Issue 428 / Nessus ID 240052)
CVE-2022-34526 | Tiffsplit 4.4.0 TIFF File _TIFFVGetField stack-based overflow (Issue 433 / Nessus ID 240052)
CVE-2022-2520 | libtiff 4.4.0rc1 tiffcrop.c rotateImage buffer size (Issue 424 / Nessus ID 240052)
CVE-2022-3626 | LibTIFF 4.4.0 TIFF File libtiff/tif_unix.c _TIFFmemset out-of-bounds write (Issue 426 / Nessus ID 240052)
CVE-2022-3627 | LibTIFF 4.4.0 TIFF File libtiff/tif_unix.c _TIFFmemcpy out-of-bounds write (ID 411 / Nessus ID 240052)
CVE-2022-40090 | libtiff up to 4.3.x TIFF File TIFFReadDirectory denial of service (Issue 455 / Nessus ID 240052)
CVE-2022-3598 | LibTIFF 4.4.0 TIFF File tools/tiffcrop.c extractContigSamplesShifted24bits out-of-bounds write (Issue 435 / Nessus ID 240052)
CVE-2022-3570 | LibTIFF 4.4.0 TIFF File tiffcrop.c out-of-bounds (ID 381 / Nessus ID 240052)
CVE-2022-3599 | LibTIFF 4.4.0 TIFF File tools/tiffcrop.c writeSingleSection out-of-bounds (Issue 398 / Nessus ID 240052)
Akira
You must login to view this content
Defensie versterkt maritieme slagkracht met Tomahawks
Hackers Manipulate Search Engines to Push Malicious Sites
A new wave of cybercrime is exploiting the very backbone of internet trust: search engines. Recent research by Netcraft has exposed a sophisticated and organized SEO poisoning operation, where hackers manipulate search engine algorithms to push malicious websites to the top of search results. At the heart of this campaign is a platform known as […]
The post Hackers Manipulate Search Engines to Push Malicious Sites appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Novel TokenBreak Attack Method Can Bypass LLM Security Features
Researchers with HiddenLayers uncovered a new vulnerability in LLMs called TokenBreak, which could enable an attacker to get around content moderation features in many models simply by adding a few characters to words in a prompt.
The post Novel TokenBreak Attack Method Can Bypass LLM Security Features appeared first on Security Boulevard.
Обычное фото? Скорее портал в ад. Katz Stealer маскируется лучше, чем баги перед релизом
CISA Releases Five Industrial Control Systems Advisories
CISA released five Industrial Control Systems (ICS) advisories on June 17, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-168-01 Siemens Mendix Studio Pro
- ICSA-25-168-02 LS Electric GMWin 4
- ICSA-25-168-04 Fuji Electric Smart Editor
- ICSA-25-168-05 Dover Fueling Solutions ProGauge MagLink LX Consoles
- ICSA-24-347-10 Siemens SENTRON Powercenter 1000 (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2023-0386 Linux Kernel Improper Ownership Management Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
How Azul and Moderne Are Boosting Java Developer Productivity
Moderne and Azul are helping development teams identify, remove, and refactor unused and dead code to improve Java developer productivity.
The post How Azul and Moderne Are Boosting Java Developer Productivity appeared first on Azul | Better Java Performance, Superior Java Support.
The post How Azul and Moderne Are Boosting Java Developer Productivity appeared first on Security Boulevard.