Aggregator
披露18个月前我给投资人看的一个Demo
10 months 2 weeks ago
披露18个月前我给投资人看的一个Demo
10 months 2 weeks ago
Pwn2Own Ireland 2024 Day 2: participants demonstrated an exploit against Samsung Galaxy S24
10 months 2 weeks ago
Pwn2Own Ireland 2024 Day 2: participants demonstrated an exploit against Samsung Gala
CVE-2016-1000031 | Oracle Convergence 3.0.2 Apache Commons FileUpload access control (Nessus ID 118732 / ID 316356)
10 months 2 weeks ago
A vulnerability was found in Oracle Convergence 3.0.2. It has been rated as very critical. This issue affects some unknown processing of the component Apache Commons FileUpload. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2016-1000031. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
Senator questions internet domain companies over Russian disinformation charges
10 months 2 weeks ago
A leading U.S. Senator sent letters out to six CEOs of the largest internet domain companies questi
CFPB warns industry against ‘deeply invasive’ workplace digital surveillance
10 months 2 weeks ago
The Consumer Financial Protection Bureau (CFPB) put industry on notice Thursday, warning companies
Medusa Blog
10 months 2 weeks ago
cohenido
Medusa Blog
10 months 2 weeks ago
cohenido
CVE-2002-0716 | SCO OpenServer 5.0.5/5.0.6 crontab file name format string (XFDB-9271 / BID-4938)
10 months 2 weeks ago
A vulnerability classified as critical was found in SCO OpenServer 5.0.5/5.0.6. This vulnerability affects unknown code of the component crontab. The manipulation of the argument file name leads to format string.
This vulnerability was named CVE-2002-0716. Attacking locally is a requirement. There is no exploit available.
vuldb.com
Medusa Blog
10 months 2 weeks ago
cohenido
The future of cyber insurance: Meeting the demand for non-attack coverage
10 months 2 weeks ago
In this Help Net Security interview, Michael Daum, Head of Global Cyber Claims for Allianz Commercial, discusses the significant rise in cyber claims in 2024, driven by an increase in data breaches and ransomware attacks. Daum highlights the need for businesses to implement cyber hygiene practices and align their risk management strategies with insurers’ expectations to mitigate financial impacts and reduce premiums. Cyber claims have risen significantly in both frequency and severity in 2024. What … More →
The post The future of cyber insurance: Meeting the demand for non-attack coverage appeared first on Help Net Security.
Mirko Zorz
JVN: OMNTEC製Proteus Tank Monitoringにおける重要な機能に対する認証の欠如の脆弱性
10 months 2 weeks ago
OMNTEC Mfg., Inc.が提供するProteus Tank Monitoringには、重要な機能に対する認証の欠如の脆弱性が存在します。
CVE-2021-4145 | QEMU up to 6.1.x Block Mirror Layer mirror_wait_on_conflicts null pointer dereference (Nessus ID 209571)
10 months 2 weeks ago
A vulnerability, which was classified as problematic, has been found in QEMU up to 6.1.x. This issue affects the function mirror_wait_on_conflicts of the component Block Mirror Layer. The manipulation leads to null pointer dereference.
The identification of this vulnerability is CVE-2021-4145. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2022-26354 | QEMU up to 6.2.0 vhost-vsock Device release of resource (Nessus ID 209571)
10 months 2 weeks ago
A vulnerability classified as problematic was found in QEMU up to 6.2.0. Affected by this vulnerability is an unknown functionality of the component vhost-vsock Device. The manipulation leads to missing release of resource.
This vulnerability is known as CVE-2022-26354. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2022-0358 | QEMU virtio-fs Shared File System Daemon dropped privileges (Nessus ID 209571)
10 months 2 weeks ago
A vulnerability, which was classified as critical, was found in QEMU. Affected is an unknown function of the component virtio-fs Shared File System Daemon. The manipulation leads to improper check for dropped privileges.
This vulnerability is traded as CVE-2022-0358. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2022-26353 | QEMU 6.2.0 virtio-net Device release of resource (Nessus ID 209571)
10 months 2 weeks ago
A vulnerability classified as problematic has been found in QEMU 6.2.0. Affected is an unknown function of the component virtio-net Device. The manipulation leads to missing release of resource.
This vulnerability is traded as CVE-2022-26353. The attack can only be done within the local network. There is no exploit available.
vuldb.com
CVE-2021-4206 | QEMU QXL Display Device Emulation cursor_alloc heap-based overflow (Nessus ID 209571)
10 months 2 weeks ago
A vulnerability was found in QEMU. It has been rated as critical. Affected by this issue is the function cursor_alloc of the component QXL Display Device Emulation. The manipulation leads to heap-based buffer overflow.
This vulnerability is handled as CVE-2021-4206. Access to the local network is required for this attack. There is no exploit available.
vuldb.com
CVE-2022-0216 | QEMU LSI53C895A SCSI Host Bus Adapter Emulation lsi_do_msgout use after free (Issue 972 / Nessus ID 209571)
10 months 2 weeks ago
A vulnerability was found in QEMU. It has been rated as problematic. This issue affects the function lsi_do_msgout of the component LSI53C895A SCSI Host Bus Adapter Emulation. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2022-0216. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2023-0330 | QEMU lsi53c895a Device use after free (Nessus ID 209571)
10 months 2 weeks ago
A vulnerability has been found in QEMU and classified as critical. This vulnerability affects unknown code of the component lsi53c895a Device. The manipulation leads to use after free.
This vulnerability was named CVE-2023-0330. Access to the local network is required for this attack. There is no exploit available.
vuldb.com