Aggregator
CVE-2022-42081 | Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 sched_end_time stack-based overflow
CVE-2022-40187 | Bushnell Golf Foresight GC3 Launch Monitor 1.3.15.68 TCF access control (ATREDIS-2022-0003)
CVE-2022-41316 | HashiCorp Vault/Vault Enterprise up to 1.9.9/1.10.6/1.11.3 TLS Certificate certificate validation
CVE-2022-2828 | Octopus Server API resource injection
CVE-2022-41351 | Synacor Zimbra Collaboration Suite 8.8.15 /h/calendar view cross site scripting
CVE-2022-42086 | Tenda AX1803 US_AX1803v2.0br_v1.0.0.1_2994_CN_ZGYD01_4 TendaAteMode cross-site request forgery
CVE-2022-35080 | SWFTools 772e55a2 /lib/png.c png_load heap-based overflow (Issue 183)
CVE-2022-35081 | SWFTools 772e55a2 /src/png2swf.c png_read_header heap-based overflow (Issue 183)
CVE-2022-38902 | Liferay Portal/DXP 7.3.10 SP3 Blog Module Name cross site scripting
CVE-2022-37208 | JFinal CMS 5.1.0 sql injection
CVE-2022-41473 | RPCMS 3.0.2 Search cross site scripting
CVE-2022-41474 | RPCMS 3.0.2 cross-site request forgery
CVE-2022-41475 | RPCMS 3.0.2 cross-site request forgery
Emulating the Terrorizing VanHelsing Ransomware
AttackIQ has released a new attack graph emulating the behaviors exhibited by VanHelsing ransomware, a new and rapidly growing ransomware-as-a-service (RaaS) affiliate program that emerged in March 2025. This emulation enables defenders to test and validate their detection and response capabilities against this new threat.
The post Emulating the Terrorizing VanHelsing Ransomware appeared first on AttackIQ.
The post Emulating the Terrorizing VanHelsing Ransomware appeared first on Security Boulevard.
BitLocker加密通过Bitpixie(CVE-2023-21563)在几分钟内绕过 - PoC揭示了高风险攻击路径
Tor через oniux: без proxy, без ошибок, без утечек — только Rust и namespaces
CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited
Cybersecurity professionals and network defenders, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five newly identified Windows 0-day vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. These vulnerabilities, currently exploited in the wild, present significant risks for organizations relying on Microsoft Windows environments. The CISA urges all stakeholders to prioritize immediate mitigation efforts […]
The post CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
三个漏洞使Apache IoTDB面临攻击
Intruder vs. Acunetix vs. Attaxion: Comparing Vulnerability Management Solutions
The vulnerability management market is projected to reach US$24.08 billion by 2030, with numerous vendors offering seemingly different solutions to the same problem. How does an organization choose the right vulnerability management tool for its needs? Today, we compare three tools that offer overlapping (but different) vulnerability management capabilities—Intruder, Acunetix, and Attaxion. We’ll start with […]
The post Intruder vs. Acunetix vs. Attaxion: Comparing Vulnerability Management Solutions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.