Aggregator
Vehicle Detection, Tracking and Counting Using YOLOv11, ByteTrack, and Supervision
8 months 1 week ago
Finding vulnerabilities on flask-cors library
8 months 1 week ago
The Art of Breaking Your SQL-Powered AI Chatbot (After Building It)
8 months 1 week ago
Bypassing Email verification through HTTP response interception
8 months 1 week ago
CVE-2012-0875 | SystemTap 1.6.7/1.7 access control (RHSA-2012:0376 / Nessus ID 69661)
8 months 1 week ago
A vulnerability, which was classified as critical, was found in SystemTap 1.6.7/1.7. Affected is an unknown function. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2012-0875. An attack has to be approached locally. There is no exploit available.
vuldb.com
CVE-2012-0882 | Oracle MySQL up to 5.5.20 memory corruption (Nessus ID 58661 / ID 19857)
8 months 1 week ago
A vulnerability classified as critical was found in Oracle MySQL up to 5.5.20. Affected by this vulnerability is an unknown functionality. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2012-0882. The attack can be launched remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2012-0878 | Pythonpaste Paste 1.7.5 Access Restriction access control (RHSA-2012:1206 / Nessus ID 68604)
8 months 1 week ago
A vulnerability was found in Pythonpaste Paste 1.7.5 and classified as critical. Affected by this issue is some unknown functionality of the component Access Restriction. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2012-0878. The attack may be launched remotely. There is no exploit available.
vuldb.com
DoubleClickjacking allows clickjacking on major websites
8 months 1 week ago
DoubleClickjacking allows clickjacking on major websitesThe “Do
DoubleClickjacking allows clickjacking on major websites
8 months 1 week ago
The “DoubleClickjacking” exploit bypasses protections on major websites, using a double-click sequence for clickjacking and account takeover attacks. DoubleClickjacking is a technique that allows attackers to bypass protections on major websites by leveraging a double-click sequence. Attackers can exploit the technique to facilitate clickjacking attacks and account takeovers on almost all major websites. Clickjacking attacks trick users […]
Pierluigi Paganini
Tighter regulations proposed for foreign IT in drones used in US
8 months 1 week ago
The U.S. Commerce Department on Thursday proposed a rule to shield the supply chain of drones from
Global Campaign Targets PlugX Malware with Innovative Portal
8 months 1 week ago
Sekoia’s innovative PlugX malware disinfection campaign removed active threats across ten countries
Dark Vault
8 months 1 week ago
cohenido
2024年度盘点之漏洞威胁:AI技术降低漏洞利用门槛,网络边缘设备成重灾区
8 months 1 week ago
安全客
Building a Web Server with Python and Flask
8 months 1 week ago
The digital age demands dynamic and interactive web experiences. Building a web server is the corner
66,000 台 DrayTek 网关存在远程命令注入漏洞 (CVE-2024-12987),已发布 PoC
8 months 1 week ago
安全客
Happy New Year - HowToHack Community
8 months 1 week ago
DataDome Releases Google Cloud Platform Server-Side Integration
8 months 1 week ago
Our new Google Cloud server-side integration is the latest in a range of 50+ integrations that ensure DataDome stops bad bots & fraud on any infrastructure.
The post DataDome Releases Google Cloud Platform Server-Side Integration appeared first on Security Boulevard.
Alexandre Marlot
D-Link 就易受僵尸网络攻击的报废路由器发出警告
8 months 1 week ago
安全客
CVE-2024-55543 | Acronis Cyber Protect 16 up to 39168 uncontrolled search path
8 months 1 week ago
A vulnerability has been found in Acronis Cyber Protect 16 up to 39168 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to uncontrolled search path.
This vulnerability is known as CVE-2024-55543. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com