Aggregator
Burp Suite’s Scanning Arsenal Powered With Detection for Critical React2Shell Vulnerabilities
PortSwigger has enhanced Burp Suite’s scanning arsenal with the latest update to its ActiveScan++ extension, introducing detection for the critical React2Shell vulnerabilities (CVE-2025-55182 and CVE-2025-66478). This server-side request forgery (SSRF) flaw in React applications allows attackers to execute arbitrary shell commands, potentially leading to full remote code execution (RCE) on affected servers. Security researchers and […]
The post Burp Suite’s Scanning Arsenal Powered With Detection for Critical React2Shell Vulnerabilities appeared first on Cyber Security News.
CVE-2025-13654 | zevv Duc up to 1.4.5 buffer_get stack-based overflow (Nessus ID 277730)
CVE-2025-40307 | Linux Kernel up to 6.12.57/6.17.7 exfat_mkdir allocation of resources (Nessus ID 277729)
CVE-2025-38121 | Linux Kernel up to 6.15.2 wifi in_hw_restart null pointer dereference (EUVD-2025-19822 / Nessus ID 277738)
解析2025强网拟态决赛WeakJump
Тест Тьюринга отменен: теперь роботов проверяют на знание трехэтажного мата
美国军工承包商遭数据泄露,员工信息外泄
美国军工承包商遭数据泄露,员工信息外泄
CVE-2025-40291 | Linux Kernel up to 6.17.7 io_uring io_estimate_bvec_size privilege escalation (Nessus ID 277740)
CVE-2025-62626 | AMD Ryzen 9000HX Processors prior FireRangeFL1PI 1.0.0.0e insufficient entropy in trng (EUVD-2025-198505 / Nessus ID 277748)
CVE-2023-29321 | Adobe Animate up to 22.0.9/23.0.1 use after free (apsb23-36 / EUVD-2023-32896)
CVE-2023-29322 | Adobe Experience Manager up to 6.5.16.0 cross site scripting (apsb23-31 / EUVD-2023-32897)
CVE-2023-49383 | JFinalCMS 5.0.0 /admin/tag/save cross-site request forgery (EUVD-2023-3291)
New image signature can survive cropping, stop deepfakes from hijacking trust
Deepfake images can distort public debate, fuel harassment, or shift a news cycle before anyone checks the source. A new study from researchers at the University of Pisa examines one specific part of this problem. They introduced a way to keep image signatures intact even after cropping. System model Cropping remains a weak spot in image verification Most authentication tools fail the moment a photo is altered. Even small changes like trimming edges turn a … More →
The post New image signature can survive cropping, stop deepfakes from hijacking trust appeared first on Help Net Security.