Aggregator
Submit #755212: Tenda HG9 V300001138 Stack-based Buffer Overflow [Accepted]
Submit #755211: Tenda HG9 V300001138 Stack-based Buffer Overflow [Accepted]
Submit #755202: Tenda HG9 V300001138 Stack-based Buffer Overflow [Accepted]
Submit #755201: Tenda HG9 V300001138 Stack-based Buffer Overflow [Accepted]
Submit #755193: Tenda HG9 V300001138 Stack-based Buffer Overflow [Accepted]
Submit #755167: Tenda HG9 V300001138 Stack-based Buffer Overflow [Accepted]
CVE-2026-2904 | UTT HiPER 810G 1.7.7-171114 /goform/ConfigExceptAli strcpy buffer overflow
CVE-2026-2472 | Google Cloud Vertex AI SDK for Python up to 1.130.x _evals_visualization cross site scripting (gcp-2026-011)
CVE-2026-2473 | Google Cloud Vertex AI Experiments up to 1.132.x Bucket Naming generation of predictable numbers or identifiers (gcp-2026-012)
Submit #755113: UTT HiPER 810G v3v1.7.7-171114 Buffer Overflow [Accepted]
CVE-2026-2903 | skvadrik re2c up to 4.4 src/parse/ast.cc check_and_merge_special_rules null pointer dereference (Issue 571)
Submit #755030: skvadrik re2c 04f1424 NULL Pointer Dereference [Accepted]
‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the target and the legitimate site -- forwarding the victim's username, password and multi-factor authentication (MFA) code to the legitimate site and returning its responses.
The post ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA appeared first on Security Boulevard.
‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
NDSS 2025 – NodeMedic-FINE: Automatic Detection And Exploit Synthesis For Node.js Vulnerabilities
Session 13A: JavaScript Security
Authors, Creators & Presenters: Darion Cassel (Carnegie Mellon University), Nuno Sabino (IST & CMU), Min-Chien Hsu (Carnegie Mellon University), Ruben Martins (Carnegie Mellon University), Limin Jia (Carnegie Mellon University)
PAPER
NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities
The Node.js ecosystem comprises millions of packages written in JavaScript. Many packages suffer from vulnerabilities such as arbitrary code execution (ACE) and arbitrary command injection (ACI). Prior work has developed automated tools based on dynamic taint tracking to detect potential vulnerabilities, and to synthesize proof-of-concept exploits that confirm them, with limited success. One challenge these tools face is that expected inputs to package APIs often have varied types and object structure. Failure to call these APIs with inputs of the correct type and with specific fields leads to unsuccessful exploit generation and missed vulnerabilities. Generating inputs that can successfully deliver the desired exploit payload despite manipulation performed by the package is also difficult. To address these challenges, we use a type and object-structure aware fuzzer to generate inputs to explore more execution paths during dynamic taint analysis. We leverage information generated by the taint analysis to infer the types and structure of the inputs, which are then used by the exploit synthesis engine to guide exploit generation. We implement NodeMedic-FINE and evaluate it on 33,011 npm packages that contain calls to ACE and ACI sinks. Our tool finds 2257 potential flows and automatically synthesizes working exploits in 766 packages.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 – NodeMedic-FINE: Automatic Detection And Exploit Synthesis For Node.js Vulnerabilities appeared first on Security Boulevard.