Aggregator
CVE-2005-2943 | Davide Libenzi XMail up to 1.21 AddressFromAtPtr -t stack-based overflow (EDB-1267 / Nessus ID 22768)
CVE-2010-1929 | Novell eDirectory 8.8 LDAP RelativeToFullDN Parser memory corruption (EDB-14010 / Nessus ID 61709)
help meee
CVE-1999-0973 | Sun Solaris up to 7.0 snoop print_domain_name memory corruption (EDB-19663 / BID-858)
G.O.S.S.I.P 2024总结 & 2025展望
G.O.S.S.I.P 2024总结 & 2025展望
Elezioni USA, scoperte operazioni di disinformazione tramite server dedicati e IA
CVE-2002-0484 | PHP up to 4.1.2 move_uploaded_file privileges management (EDB-21347 / XFDB-8591)
CVE-2018-6794 | Suricata up to 4.0 HTTP Detection detect.c/stream-tcp.c TCP Packets protection mechanism (FEDORA-2018-ee417c4b28 / EDB-44247)
CVE-2011-1665 | PHPBoost 3.0 access control (EDB-17085 / XFDB-66474)
diaspora*项目七成流量来自 AI 机器人
diaspora*项目七成流量来自 AI 机器人
Dirty DAG: New Vulnerabilities in Azure Data Factory’s Apache Airflow Integration
CVE-2003-0614 | Gallery up to 1.3.4 search.php searchstring cross site scripting (EDB-22961 / Nessus ID 15192)
DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely
The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to a critical command injection vulnerability. Exploitable via the /cgi-bin/mainfunction.cgi/apmcfgupload endpoint, attackers can inject arbitrary commands into the system by manipulating the session parameter within a crafted HTTP request. The vulnerability impacts over 66,000 internet-connected devices, potentially allowing attackers to gain remote […]
The post DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2013-7057 | Axway SecureTransport 5.1 cross-site request forgery (EDB-35046 / XFDB-98320)
New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military
Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake “Army+” application websites, which host a malicious installer that, upon execution, extracts the legitimate application alongside the Tor browser. The installer includes a PowerShell script that indicates the Tor browser’s inclusion is not for legitimate use, suggesting it’s likely intended for covert communication […]
The post New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.