Aggregator
CVE-2022-30786 | Tuxera NTFS-3G up to 2021.8.22 NTFS Image ntfs_names_full_collate heap-based overflow (GHSA-xchm-ph5h-hw4x / EUVD-2022-52609)
CVE-2022-30788 | Tuxera NTFS-3G up to 2021.8.22 NTFS Image ntfs_mft_rec_alloc heap-based overflow (GHSA-xchm-ph5h-hw4x / EUVD-2022-52611)
CVE-2022-30789 | Tuxera NTFS-3G up to 2021.8.22 NTFS Image ntfs_check_log_client_array heap-based overflow (GHSA-xchm-ph5h-hw4x / EUVD-2022-52612)
CVE-2022-30784 | Tuxera NTFS-3G up to 2021.8.22 NTFS Image ntfs_get_attribute_value heap-based overflow (GHSA-xchm-ph5h-hw4x / EUVD-2022-52607)
Cloudflare Blocks Aisuru Botnet Powered Largest Ever 29.7 Tbps DDoS Attack
CVE-2017-13055 | tcpdump up to 4.9.1 ISO IS-IS Parser print-isoclns.c isis_print_is_reach_subtlv memory corruption (Nessus ID 103257 / ID 370625)
CVE-2017-13048 | Apple macOS up to 10.13.1 tcpdump memory corruption (HT208221 / Nessus ID 100472)
CVE-2017-13050 | Apple macOS up to 10.13.1 tcpdump memory corruption (HT208221 / Nessus ID 100472)
CVE-2017-13054 | Apple macOS up to 10.13.1 tcpdump memory corruption (HT208221 / Nessus ID 100472)
CVE-2017-13055 | Apple macOS up to 10.13.1 tcpdump memory corruption (HT208221 / Nessus ID 100472)
CVE-2017-13053 | Apple macOS up to 10.13.1 tcpdump memory corruption (HT208221 / Nessus ID 100472)
Akira
You must login to view this content
Akira
You must login to view this content
Скайнет, начало. Блогер научил робота стрелять в людей (пока что пластиком, но все же)
AI 时代精英更容易操控民意
CISA Warns of OpenPLC ScadaBR File Upload Vulnerability Exploited in Attacks
Critical vulnerability has been added to CISA’s Known Exploited Vulnerabilities list, warning organizations about a dangerous file-upload flaw in OpenPLC ScadaBR systems. The vulnerability allows remote authenticated users to upload and execute arbitrary JSP files through the view_edit.shtm interface, creating a significant risk for industrial control system environments. OpenPLC ScadaBR File Upload Vulnerability OpenPLC ScadaBR, […]
The post CISA Warns of OpenPLC ScadaBR File Upload Vulnerability Exploited in Attacks appeared first on Cyber Security News.
SecWiki News 2025-12-04 Review
【情报】日本对华战略分析:经济合作与安全保障的双重奏
Dangerous RCE Flaw in React, Next.js Threatens Cloud Environments, Apps
Security and developer teams are scrambling to address a highly critical security flaw in frameworks tied to the popular React JavaScript library. Not only is the vulnerability, which also is in the Next.js framework, easy to exploit, but React is widely used, including in 39% of cloud environments.
The post Dangerous RCE Flaw in React, Next.js Threatens Cloud Environments, Apps appeared first on Security Boulevard.