Aggregator
CVE-2023-0288 | Apple macOS up to 13.2.1 Vim heap-based overflow (HT213670 / EUVD-2023-12366)
CVE-2023-0288 | vim up to 9.0.1145 heap-based overflow (EUVD-2023-12366)
CVE-2023-2103 | alextselegidis easyappointments up to 1.4.x cross site scripting (EUVD-2023-1230)
CVE-2023-2428 | thorsten phpmyfaq up to 3.1.12 cross site scripting (EUVD-2023-1235)
CVE-2023-0225 | Samba 4.17 LDAP Attribute dnsHostname permission (EUVD-2023-12311)
Review: Attack Surface Management
Attack Surface Management (ASM) has become one of those buzzwords that gets used a lot but rarely explained in detail. The authors of this book offer a practical guide that aims to change that. About the authors Ron Eddings is the Executive Producer at Hacker Valley Media. Melody Kaufmann is a freelance cybersecurity writer, and holds a Master’s in Information Security. Inside the book Organizations are dealing with environments that are always changing. These include … More →
The post Review: Attack Surface Management appeared first on Help Net Security.
CVE-2014-3139 | Unitrends Enterprise Backup 7.3.0 auth improper authentication (EDB-32885 / ID 800787)
Купленная игра может исчезнуть навсегда. И вы ничего не докажете
TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors
TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors
微步 XGPT 获 CCIA 首批 "网安三新" 认证 成安全大模型领域标杆成果
CVE-2024-44762 | Webmin Usermin 2.100 information exposure (EDB-52254)
How to Use Sudo 1.9.13 Exploit?
CVE-2025-7108 | risesoft-y9 Digital-Infrastructure up to 9.6.7 Y9FileController.java deleteFile fullPath path traversal (EUVD-2025-20185)
CVE-2025-7109 | Portabilis i-Educar 2.9.0 Student Benefits Registration educar_aluno_beneficio_lst.php Benefício cross site scripting (EUVD-2025-20181)
Time Series Is Everywhere—Here’s How to Actually Forecast It
Today’s Threats Move Fast—Your SIEM Needs to Move Faster
New technique detects tampering or forgery of a PDF document
Researchers from the University of Pretoria presented a new technique for detecting tampering in PDF documents by analyzing the file’s page objects. The technique employs a prototype that can detect changes to a PDF document, such as changes made to the text, images, or metadata. Prototype flow With the PDF format being used as a formal means of communication in multiple industries, it has become a good target for criminals who wish to affect contracts … More →
The post New technique detects tampering or forgery of a PDF document appeared first on Help Net Security.