Aggregator
Submit #733346: nicbarker clay v0.14 and master-branch Memory Corruption [Accepted]
Submit #733345: floooh sokol 33e2271 Memory Corruption [Duplicate]
Credential-stealing Chrome extensions target enterprise HR platforms
Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
Let’s Encrypt, a key provider of free TLS certificates, has rolled out short-lived and IP address-based certificates for general use. These new options became available starting in early 2026, addressing long-standing issues in certificate security. Short-lived certificates last just 160 hours, about six and a half days, while IP-based ones tie directly to IP addresses […]
The post Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available appeared first on Cyber Security News.
CVE-2025-15534 | raysan5 raylib up to 909f040 src/rtext.c LoadFontData integer overflow (Issue 5436 / EUVD-2026-3184)
CVE-2025-15533 | raysan5 raylib up to 909f040 src/rtext.c GenImageFontAtlas heap-based overflow (Issue 5433 / EUVD-2026-3187)
Submit #733343: raysan5 raylib 909f040 Integer Overflow [Accepted]
Submit #733342: raysan5 raylib 909f040 Heap-based Buffer Overflow [Duplicate]
Submit #733341: raysan5 raylib 909f040 Heap-based Buffer Overflow [Accepted]
Здравствуйте, мы ваши новые админы. UAT-8837 берёт под контроль сети в Северной Америке
NDSS 2025 – ScopeVerif: Analyzing The Security Of Android’s Scoped Storage Via Differential Analysis
Session 9A: Android Security 2
Authors, Creators & Presenters: Zeyu Lei (Purdue University), Güliz Seray Tuncay (Google), Beatrice Carissa Williem (Purdue University), Z. Berkay Celik (Purdue University), Antonio Bianchi (Purdue University)
PAPER
ScopeVerif: Analyzing the Security of Android's Scoped Storage via Differential Analysi
Storage on Android has evolved significantly over the years, with each new Android version introducing changes aimed at enhancing usability, security, and privacy. While these updates typically help with restricting app access to storage through various mechanisms, they may occasionally introduce new complexities and vulnerabilities. A prime example is the introduction of scoped storage in Android 10, which fundamentally changed how apps interact with files. While intended to enhance user privacy by limiting broad access to shared storage, scoped storage has also presented developers with new challenges and potential vulnerabilities to address. However, despite its significance for user privacy and app functionality, no systematic studies have been performed to study Android's scoped storage at depth from a security perspective. In this paper, we present the first systematic security analysis of the scoped storage mechanism. To this end, we design and implement a testing tool, named ScopeVerif, that relies on differential analysis to uncover security issues and implementation inconsistencies in Android's storage. Specifically, ScopeVerif takes a list of security properties and checks if there are any file operations that violate any security properties defined in the official Android documentation. Additionally, we conduct a comprehensive analysis across different Android versions as well as a cross-OEM analysis to identify discrepancies in different implementations and their security implications. Our study identifies both known and unknown issues of scoped storage. Our cross-version analysis highlights undocumented changes as well as partially fixed security loopholes across versions. Additionally, we discovered several vulnerabilities in scoped storage implementations by different OEMs. These vulnerabilities stem from deviations from the documented and correct behavior, which potentially poses security risks. The affected OEMs and Google have acknowledged our findings and offered us bug bounties in response.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 – ScopeVerif: Analyzing The Security Of Android’s Scoped Storage Via Differential Analysis appeared first on Security Boulevard.
SecWiki News 2026-01-17 Review
更多最新文章,请访问SecWiki
China-linked APT UAT-8837 targets North American critical infrastructure
美国网络武器切断委内瑞拉的电力并干扰雷达
JFrog Researchers Uncover RCE Exploit for Existing Redis Database Vulnerability
JFrog this week published an analysis of a vulnerability in Redis databases that may be more serious than initially thought following the discovery of a remote code execution (RCE) exploit. Researchers found that a stack buffer overflow vulnerability in Redis (CVE-2025-62507) can be used to run the XACKDEL command with multiple IDs to trigger a..
The post JFrog Researchers Uncover RCE Exploit for Existing Redis Database Vulnerability appeared first on Security Boulevard.