Aggregator
注意喚起: Adobe AcrobatおよびReaderの脆弱性(APSB25-85)に関する注意喚起 (公開)
5 months ago
新型WAF防火墙绕过技术,结合参数污染实现JS注入攻击
5 months ago
新型WAF防火墙绕过技术,结合参数污染实现JS注入攻击
5 months ago
当前环境异常,需完成验证后方可继续访问。
CVE-2018-0769 | Microsoft Edge Scripting Engine memory corruption (EDB-43710 / Nessus ID 105547)
5 months ago
A vulnerability categorized as critical has been discovered in Microsoft Edge. Affected by this vulnerability is an unknown functionality of the component Scripting Engine. Executing manipulation can lead to memory corruption.
The identification of this vulnerability is CVE-2018-0769. The attack may be launched remotely. Furthermore, there is an exploit available.
It is advisable to implement a patch to correct this issue.
vuldb.com
CVE-2018-0840 | Microsoft Internet Explorer 10/11 Scripting Engine memory corruption (EDB-44077 / Nessus ID 106801)
5 months ago
A vulnerability, which was classified as critical, was found in Microsoft Internet Explorer 10/11. This affects an unknown function of the component Scripting Engine. The manipulation results in memory corruption.
This vulnerability is known as CVE-2018-0840. It is possible to launch the attack remotely. Furthermore, an exploit is available.
It is advisable to implement a patch to correct this issue.
vuldb.com
CVE-2018-0840 | Microsoft Edge Scripting Engine memory corruption (EDB-44077 / Nessus ID 106800)
5 months ago
A vulnerability has been found in Microsoft Edge and classified as critical. This impacts an unknown function of the component Scripting Engine. This manipulation causes memory corruption.
This vulnerability is handled as CVE-2018-0840. The attack can be initiated remotely. Additionally, an exploit exists.
Applying a patch is the recommended action to fix this issue.
vuldb.com
CVE-2018-8288 | Microsoft Internet Explorer 11 Scripting Engine memory corruption (EDB-45213 / Nessus ID 110981)
5 months ago
A vulnerability was found in Microsoft Internet Explorer 11 and classified as critical. Affected is an unknown function of the component Scripting Engine. Such manipulation leads to memory corruption.
This vulnerability is documented as CVE-2018-8288. The attack can be executed remotely. Additionally, an exploit exists.
It is advisable to implement a patch to correct this issue.
vuldb.com
CVE-2018-8288 | Microsoft Edge/ChakraCore Scripting Engine memory corruption (EDB-45213 / Nessus ID 110981)
5 months ago
A vulnerability has been found in Microsoft Edge and ChakraCore and classified as critical. This impacts an unknown function of the component Scripting Engine. This manipulation causes memory corruption.
This vulnerability is registered as CVE-2018-8288. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
To fix this issue, it is recommended to deploy a patch.
vuldb.com
CVE-2018-8139 | Microsoft Edge/ChakraCore Scripting Engine memory corruption (EDB-45012 / Nessus ID 109605)
5 months ago
A vulnerability described as critical has been identified in Microsoft Edge and ChakraCore. Affected by this vulnerability is an unknown functionality of the component Scripting Engine. Such manipulation leads to memory corruption.
This vulnerability is listed as CVE-2018-8139. The attack may be performed from remote. In addition, an exploit is available.
A patch should be applied to remediate this issue.
vuldb.com
师恩如塔,山海同明
5 months ago
当前环境异常,需完成验证后才能继续访问。
师恩如塔,山海同明
5 months ago
一支粉笔,两袖微尘
三尺讲台,四季耕耘
师泽如光,微以致远
师泽若水,润物无声
ISC Stormcast For Wednesday, September 10th, 2025 https://isc.sans.edu/podcastdetail/9606, (Wed, Sep 10th)
5 months ago
ISC Stormcast播客讨论了近期网络安全威胁、勒索软件攻击、供应链漏洞及网络钓鱼活动,并提供了防御建议。
Zero Trust's Next Phase: Agility, Identity, AI Risks
5 months ago
Why CISOs Must Rethink Access, Behavioral Analytics and AI Governance at Scale
Zero trust is evolving beyond static controls and network segmentation. CISOs must prepare for dynamic, behavior-driven security models that incorporate real-time intelligence, enforce identity and data safeguards, and manage AI as both a threat vector and a security tool.
Zero trust is evolving beyond static controls and network segmentation. CISOs must prepare for dynamic, behavior-driven security models that incorporate real-time intelligence, enforce identity and data safeguards, and manage AI as both a threat vector and a security tool.
Webinar | Top AI Attacks and How ITDR Can Prevent Them
5 months ago
Webinar | How Enterprises Are Turning AI Into Business Value
5 months ago
SOC Agents: The New AI Gamble
5 months ago
In the Rush for AI-Run SOCs, Security Experts Warn of Trust and Governance Issues
AI SOC agents are touted as the future of security operations, promising nonstop triage and faster response. But cybersecurity experts warn most autonomous AI solutions are still immature, prone to false answers and lack the guardrails needed to keep them from running amok.
AI SOC agents are touted as the future of security operations, promising nonstop triage and faster response. But cybersecurity experts warn most autonomous AI solutions are still immature, prone to false answers and lack the guardrails needed to keep them from running amok.
Hackers Compromise 18 NPM Packages in Supply Chain Attack
5 months ago
Attacker Socially Engineered Developer With Phishing Email
A hacker laced 18 popular npm packages with cryptocurrency stealing malware after socially engineering the developer into giving up his credentials to the JavaScript runtime environment. Aikido Security said the 18 software packages collectively have downloads of more than two billion each week.
A hacker laced 18 popular npm packages with cryptocurrency stealing malware after socially engineering the developer into giving up his credentials to the JavaScript runtime environment. Aikido Security said the 18 software packages collectively have downloads of more than two billion each week.
US Feds Indict LockerGoga and MegaCortex Ransomware Hacker
5 months ago
State Department Offers Up to $10M for Tips on Volodymyr Tymoshchuk
A hacker who federal prosecutors say was behind the LockerGoga and MegaCortex ransomware strains faces a seven count criminal indictment in U.S. federal court, prosecutors said Tuesday. Ukrainian national Volodymyr Tymoshchuk, 28, was administrator of the two ransomware operations, prosecutors say.
A hacker who federal prosecutors say was behind the LockerGoga and MegaCortex ransomware strains faces a seven count criminal indictment in U.S. federal court, prosecutors said Tuesday. Ukrainian national Volodymyr Tymoshchuk, 28, was administrator of the two ransomware operations, prosecutors say.
Hand-Tool Maker Says Hack Compromised Medical Info
5 months ago
Breach Affecting 104,000 Underscores Health Data Risks for Non-Healthcare Firms
An Ohio hand tool manufacturer that sells its products through franchises is notifying nearly 104,000 people of a breach potentially compromising their medical data. The incident is a cautionary tale for non-healthcare sector entities about the risks they face involving health information.
An Ohio hand tool manufacturer that sells its products through franchises is notifying nearly 104,000 people of a breach potentially compromising their medical data. The incident is a cautionary tale for non-healthcare sector entities about the risks they face involving health information.