Aggregator
Submit #634158: mtons https://gitee.com/mtons/mblog <=3.5.0 Reflected XSS [Accepted]
Submit #634157: mtons https://gitee.com/mtons/mblog <=3.5.0 Reflected XSS [Accepted]
Submit #634156: mtons https://gitee.com/mtons/mblog <=3.5.0 Stored XSS [Accepted]
Unmasking KorPlug Malware: TTPs, Control Flow, and Exposed IOCs
As part of the ongoing analysis of the KorPlug malware family, this second installment focuses on the complex second-stage payload, expanding on earlier discoveries of DLL side-loading methods that use legitimate programs to execute code initially. The payload, a malicious DLL with SHA-256 hash b6b239fe0974cf09fe8ee9bc5d0502174836a79c53adccdbb1adeb1f15c6845c, measures 638,976 bytes (624 KB) and is structured as an […]
The post Unmasking KorPlug Malware: TTPs, Control Flow, and Exposed IOCs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Submit #634155: mtons https://gitee.com/mtons/mblog <=3.5.0 Stored XSS [Duplicate]
Submit #634153: mtons https://gitee.com/mtons/mblog <=3.5.0 Stored XSS [Accepted]
CVE-2020-36223 | OpenLDAP up to 2.4.56 out-of-bounds (WID-SEC-2023-1127)
CVE-2020-36224 | OpenLDAP up to 2.4.56 slapd saslAuthzTo denial of service (WID-SEC-2023-1127)
CVE-2020-36223 | Apple macOS up to 11.3 OpenLDAP denial of service (HT212529 / WID-SEC-2023-1127)
CVE-2020-36222 | OpenLDAP up to 2.4.56 saslAuthzTo denial of service (WID-SEC-2023-1127)
CVE-2020-36222 | Apple macOS up to 11.3 OpenLDAP denial of service (HT212529 / WID-SEC-2023-1127)
CVE-2020-36221 | OpenLDAP up to 2.4.56 slapd schema_init.c serialNumberAndIssuerCheck integer underflow (WID-SEC-2023-1127)
CVE-2021-27212 | OpenLDAP up to 2.4.57/2.5.1alpha slapd schema_init.c issuerAndThisUpdateCheck denial of service (WID-SEC-2023-1126)
CVE-2020-36221 | Apple macOS up to 11.3 OpenLDAP denial of service (HT212529 / WID-SEC-2023-1127)
WgetCloud: прокси-сервис стал прибежищем для хакеров, а затем — их приговором
Hackers Abuse Python eval/exec Calls to Run Malicious Code
Threat actors are increasingly abusing native evaluation and execution functions to conceal and execute malicious payloads within innocent-looking packages on PyPI. Security researchers warn that while static analysis libraries such as hexora can detect many obfuscation techniques, attackers continue innovating ways to slip harmful code past simple scanners. Supply chain attacks targeting Python packages have surged, with […]
The post Hackers Abuse Python eval/exec Calls to Run Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.