Aggregator
Submit #589458: SourceCodester Student Result Management System 1.0 Improper Access Control for Register Interface [Accepted]
CVE-2025-5648 | Radare2 5.9.9 radiff2 /libr/cons/pal.c r_cons_pal_init -T memory corruption
Best Practices for Improving Hybrid and Multicloud Performance
Widespread Campaign Targets Cybercriminals and Gamers
CVE-2025-5647 | Radare2 5.9.9 radiff2 /libr/cons/cons.c r_cons_context_break_pop -T memory corruption (Issue 24237)
Submit #586929: radare2 radiff2 5.9.9 and master branch Memory corruption [Accepted]
CVE-2025-5646 | Radare2 5.9.9 radiff2 /libr/cons/pal.c r_cons_rainbow_free -T memory corruption (Issue 24235)
Submit #586928: radare2 radiff2 5.9.9 and master branch Memory corruption [Accepted]
CVE-2025-5645 | Radare2 5.9.9 radiff2 /libr/cons/pal.c r_cons_pal_init -T memory corruption (Issue 24234)
Submit #586923: radare2 radiff2 5.9.9 and master branch Memory corruption [Accepted]
Windows Authentication Coercion Attacks Present Major Risks to Enterprise Networks
Authentication coercion remains a potent attack vector in Windows environments, enabling attackers with even low-privileged domain accounts to force targeted systems, often high-value servers or domain controllers, to authenticate to attacker-controlled hosts. This technique is closely tied to NTLM and Kerberos relay attacks, where the coerced authentication session is intercepted and relayed to other services, […]
The post Windows Authentication Coercion Attacks Present Major Risks to Enterprise Networks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-5644 | Radare2 5.9.9 radiff2 /libr/cons/cons.c r_cons_flush -T use after free (Issue 24233)
Submit #586922: radare2 radiff2 5.9.9 and master branch Memory corruption [Accepted]
CVE-2025-5643 | Radare2 5.9.9 radiff2 /libr/cons/cons.c cons_stack_load -T memory corruption (Issue 24232)
诚邀渠道合作伙伴共启新征程
预警 : 病毒“黑吃黑”,GitHub开源远控项目暗藏后门
Submit #586921: radare2 radiff2 5.9.9 and master branch Memory corruption [Accepted]
Your SaaS Data Isn't Safe: Why Traditional DLP Solutions Fail in the Browser Era
Cobalt improves pentest transparency, automation, and risk prioritization
Cobalt announced a set of product enhancements within the Cobalt Offensive Security Platform aimed at helping customers scale security testing with greater clarity, automation, and control. These innovations further the company’s commitment to deliver expert-driven, fast-to-launch pentesting, now with even richer data and streamlined workflows. The Cobalt Platform centralizes access to security services from a team of expert pentesters, making it easier to find and fix vulnerabilities across an organization’s environments. By enabling faster pentest … More →
The post Cobalt improves pentest transparency, automation, and risk prioritization appeared first on Help Net Security.