Aggregator
CVE-2007-5264 | Battlefront Dropteam 1.3.3 information disclosure (EDB-30643 / XFDB-36978)
CVE-1999-1007 | VDOnet VDOLive Player 3.0.2 VDO File memory corruption (EDB-19678 / BID-872)
CVE-2018-3245 | Oracle WebLogic Server 10.3.6.0/12.1.3.0/12.2.1.3 WLS Core Components access control (EDB-46513 / Nessus ID 118205)
CVE-2003-1032 | Pi3 Pi3Web 2.0.2 Beta 1 Directory Listing name memory corruption (EDB-22718 / BID-7787)
CVE-2006-5379 | NVIDIA Binary Graphics Driver V8774 memory corruption (VU#147252 / EDB-2581)
CVE-2004-2007 | Adam Webb Nukejokes 1.7/2.0 Beta modules.php CatView/JokeView cat/jokeid cross site scripting (EDB-24099 / XFDB-16096)
CVE-2017-2524 | Apple tvOS up to 10.2.0 TextInput memory corruption (HT207801 / EDB-42051)
DEF CON 32 – Navigating the Turbulent Skies of Aviation Cyber Regulation
Authors/Presenters: M. Weigand, S. Wagner
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – Navigating the Turbulent Skies of Aviation Cyber Regulation appeared first on Security Boulevard.
SecWiki News 2025-02-02 Review
量子DNS注入攻击技术 by ourren
Pwn2Own Automotive 2025结果汇总 by ourren
一款专为红队恶意软件开发而设计的自动化分析沙箱 by ourren
Google发布AI智能体白皮书 by ourren
ChatGPT在漏洞管理中的创新应用 by ourren
[SUCTF2025] SU_APP、SU_Harmony 出题小记 by ourren
更多最新文章,请访问SecWiki
Resolutions for resilience: Embracing AI responsibly for streamlined detection
CVE-2016-3411 | Synacor Zimbra Collaboration up to 8.6.x cross site scripting (Bug 103609 / EDB-45177)
CVE-2000-0262 | AVM KEN! 1.3.10/1.4.30 Request denial of service (EDB-19843 / Nessus ID 10375)
CVE-2010-4814 | Bestsoftinc Advance Hotel Booking System 1.0 index1.php page sql injection (EDB-15531 / XFDB-63268)
CVE-2003-0276 | Pi3 Pi3Web 2.0.1 GET Request memory corruption (EDB-22 / Nessus ID 11695)
CVE-2002-2129 | w-Agora 4.1.5 Form editform.php cross site scripting (EDB-22109 / XFDB-10920)
PyPI adds project archiving system to stop malicious updates
Weekly Cybersecurity Update: Recent Cyber Attacks, Vulnerabilities, and Data Breaches
Welcome to this week’s Cybersecurity Newsletter, which presents the latest updates and key insights from the continuously evolving domain of cybersecurity. In the fast-paced digital environment of today, it is imperative to remain informed, and our objective is to provide you with the most relevant information to navigate these challenges effectively. This edition emphasizes emerging […]
The post Weekly Cybersecurity Update: Recent Cyber Attacks, Vulnerabilities, and Data Breaches appeared first on Cyber Security News.
CVE-2007-3327 | Bughunter HTTP Server 1.6.2 httpsv.exe information disclosure (EDB-30218 / XFDB-34960)
Hackers Hijack JFK File Release: Malware & Phishing Surge
Veriti Research has uncovered a potentially growing cyber threat campaign surrounding the release of the declassified JFK, RFK, and MLK files. Attackers are capitalizing on public interest in these historical documents to launch potential malware campaigns, phishing schemes, and exploit attempts. Our research indicates that cybercriminals are quick to react to major public events, and […]
The post Hackers Hijack JFK File Release: Malware & Phishing Surge appeared first on VERITI.
The post Hackers Hijack JFK File Release: Malware & Phishing Surge appeared first on Security Boulevard.