Aggregator
CVE-2026-2653 | admesh up to 0.98.5 src/normals.c stl_check_normal_vector heap-based overflow (Issue 65 / Nessus ID 299486)
CVE-2026-27171 | zlib up to 1.3.1 crc32_combine64/crc32_combine_gen64 improper validation of specified quantity in input (Issue 904 / Nessus ID 299392)
CVE-2026-2644 | niklasso minisat up to 2.2.0 DIMACS File Parser core/SolverTypes.h Solver::value variable index out-of-bounds (Issue 55 / Nessus ID 299391)
Datawhale Easy-Vibe 开源学习 task4 为原型注入AI能力
Predator spyware hooks iOS SpringBoard to hide mic, camera activity
Qilin
You must login to view this content
🤙 T00ls祝大家 六六大顺 🚀
Hackers Leveraging Multiple AI Services to Compromise 600+ FortiGate Devices
A financially motivated threat actor exploited various commercial generative AI services to compromise over 600 FortiGate devices across more than 55 countries between January 11 and February 18, 2026. The campaign marks a defining demonstration of how AI is lowering the technical entry barrier to offensive cyber operations, enabling a low- to medium-skilled individual or […]
The post Hackers Leveraging Multiple AI Services to Compromise 600+ FortiGate Devices appeared first on Cyber Security News.
NDSS 2025 -DUMPLING: Fine-Grained Differential JavaScript Engine Fuzzing
Session 13A: JavaScript Security
Authors, Creators & Presenters: Liam Wachter (EPFL), Julian Gremminger (EPFL), Christian Wressnegger (Karlsruhe Institute of Technology (KIT)), Mathias Payer (EPFL), Flavio Toffalini (EPFL)
PAPER
DUMPLING: Fine-Grained Differential JavaScript Engine Fuzzing
Web browsers are ubiquitous and execute untrusted JavaScript (JS) code. JS engines optimize frequently executed code through just-in-time (JIT) compilation. Subtly conflicting assumptions between optimizations frequently result in JS engine vulnerabilities. Attackers can take advantage of such diverging assumptions and use the flexibility of JS to craft exploits that produce a miscalculation, remove bounds checks in JIT compiled code, and ultimately gain arbitrary code execution. Classical fuzzing approaches for JS engines only detect bugs if the engine crashes or a runtime assertion fails. Differential fuzzing can compare interpreted code against optimized JIT compiled code to detect differences in execution. Recent approaches probe the execution states of JS programs through ad-hoc JS functions that read the value of variables at runtime. However, these approaches have limited capabilities to detect diverging executions and inhibit optimizations during JIT compilation, thus leaving JS engines under-tested. We propose DUMPLING, a differential fuzzer that compares the full state of optimized and unoptimized execution for arbitrary JS programs. Instead of instrumenting the JS input, DUMPLING instruments the JS engine itself, enabling deep and precise introspection. These extracted fine-grained execution states, coined as (frame) dumps, are extracted at a high frequency even in the middle of JIT compiled functions. DUMPLING finds eight new bugs in the thoroughly tested V8 engine, where previous differential fuzzing approaches struggled to discover new bugs. We receive $11,000 from Google's Vulnerability Rewards Program for reporting the vulnerabilities found by DUMPLING.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 -DUMPLING: Fine-Grained Differential JavaScript Engine Fuzzing appeared first on Security Boulevard.
SecWiki News 2026-02-21 Review
更多最新文章,请访问SecWiki
SuperClaw – Open-Source Framework to Red-Team AI Agents for Security Testing
Superagentic AI has released SuperClaw, an open-source, pre-deployment security testing framework built specifically for autonomous AI coding agents. Announced in late 2025, SuperClaw addresses a growing blind spot in enterprise AI adoption: agents are routinely deployed with broad tool access and high privileges, yet most organizations skip structured security validation entirely before going live. The […]
The post SuperClaw – Open-Source Framework to Red-Team AI Agents for Security Testing appeared first on Cyber Security News.