Aggregator
CVE-2010-4279 | Artica Pandora FMS up to 2.1.1 Default Configuration index.php loginhash_data improper authentication (ID 129830 / EDB-35731)
5 months ago
A vulnerability was found in Artica Pandora FMS up to 2.1.1 and classified as critical. This issue affects some unknown processing of the file index.php of the component Default Configuration. The manipulation of the argument loginhash_data leads to improper authentication.
The identification of this vulnerability is CVE-2010-4279. The attack may be initiated remotely. Furthermore, there is an exploit available.
vuldb.com
Malicious npm packages target Ethereum developers' private keys
5 months ago
Twenty malicious packages impersonating the Hardhat development environment used by Ethereum developers are targeting private keys and other sensitive data. [...]
Bill Toulas
Alleged Sale of 7zip Exploit CVE-2024-11477
5 months ago
Alleged Sale of 7zip Exploit CVE-2024-11477
Dark Web Informer - Cyber Threat Intelligence
[2025]Steam假入库深入解析
5 months ago
[2025]Steam假入库深入解析
Emerging Threat Trends for 2025 Threat Brief: What CTI Teams Need to Know
5 months ago
Executive Summary:The year 2025 is poised to redefine the cybersecurity landscape, marke
ignis-sec/Markopy: Markov Model libraries, optimized for cracking-focused password generations.
5 months ago
Table of Contents About The Project Possible Us
Clarification on Shor’s Algorithm and GNFS Comparison
5 months ago
Some of our astute readers noticed an apparent anomaly in the graph comparing the complexities of Shor’s algorithm and GNFS in the original blog. Specifically, it seemed as though GNFS (General Number Field Sieve) outperformed quantum-accelerated Shor’s algorithm for practical RSA key sizes (e.g., 2048 bits). This led to the seemingly absurd conclusion that RSA […]
The post Clarification on Shor’s Algorithm and GNFS Comparison appeared first on ColorTokens.
The post Clarification on Shor’s Algorithm and GNFS Comparison appeared first on Security Boulevard.
Satyam Tyagi
CVE-2022-31635 | HP BIOS toctou
5 months ago
A vulnerability was found in HP BIOS and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to time-of-check time-of-use.
This vulnerability is handled as CVE-2022-31635. The attack needs to be approached within the local network. There is no exploit available.
vuldb.com
CVE-2022-31636 | HP BIOS toctou
5 months ago
A vulnerability, which was classified as problematic, has been found in HP BIOS. Affected by this issue is some unknown functionality. The manipulation leads to time-of-check time-of-use.
This vulnerability is handled as CVE-2022-31636. Access to the local network is required for this attack to succeed. There is no exploit available.
vuldb.com
CVE-2023-34824 | fdkaac up to 1.0.4 caf_reader.c caf_info heap-based overflow (Issue 55)
5 months ago
A vulnerability, which was classified as critical, has been found in fdkaac up to 1.0.4. This issue affects the function caf_info of the file caf_reader.c. The manipulation leads to heap-based buffer overflow.
The identification of this vulnerability is CVE-2023-34824. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-34865 | UJCMS 6.0.2 Rename path traversal
5 months ago
A vulnerability was found in UJCMS 6.0.2 and classified as critical. Affected by this issue is some unknown functionality of the component Rename Handler. The manipulation leads to path traversal.
This vulnerability is handled as CVE-2023-34865. Access to the local network is required for this attack to succeed. There is no exploit available.
vuldb.com
CVE-2023-34867 | Jerryscript 3.0 ecma-property-hashmap.c ecma_property_hashmap_create assertion (Issue 5084)
5 months ago
A vulnerability was found in Jerryscript 3.0. It has been classified as critical. Affected is the function ecma_property_hashmap_create of the file jerry-core/ecma/base/ecma-property-hashmap.c. The manipulation leads to reachable assertion.
This vulnerability is traded as CVE-2023-34867. The attack can only be initiated within the local network. There is no exploit available.
vuldb.com
Sintesi riepilogativa delle campagne malevole nella settimana del 28 dicembre – 3 gennaio
5 months ago
03/01/2025 riepilogo In questa settimana, il CE
My Notes on Code-Review from Bug Bounty Bootcamp
5 months ago
Before starting, Thanks to Vickie Li for making this awesome book on Bug Bounty
国补将扩大到手机、平板和智能手表等设备
5 months ago
为促进消费,国补将扩大到手机、平板电脑和智能手表等个人设备。在周五国新办举行的中国经济高质量发展成效新闻发布会上,国家发展改革委副秘书长表示,“实施手机等数码产品购新补贴,对个人消费者购买
国补将扩大到手机、平板和智能手表等设备
5 months ago
为促进消费,国补将扩大到手机、平板电脑和智能手表等个人设备。在周五国新办举行的中国经济高质量发展成效新闻发布会上,国家发展改革委副秘书长表示,“实施手机等数码产品购新补贴,对个人消费者购买手机、平板、智能手表手环等3类数码产品给予补贴。”此前的国补主要限于家用电器和电脑等产品。由于缺乏令人兴奋的新功能和紧缩开支,后疫情时代的中国消费者更长时间的保留智能手机。最新的政策宣布之后,智能手机代工厂和供应链公司的股价普遍上涨。
当黑客那些年之帐户接管系列漏洞-案例一斩获1000$
5 months ago
这篇文章将介绍作者在 Hackerone 的私人项目中发现的一个漏洞,该漏洞允许我接管任何用户的账户。
当黑客那些年之帐户接管系列漏洞-案例一斩获1000$
5 months ago
这篇文章将介绍作者在 Hackerone 的私人项目中发现的一个漏洞,该漏洞允许我接管任何用户的账户。在开始之前,我想先提供一些关于 Host 头的小基础知识。什么是 HTTP Host 头? HTT
CVE-2005-1523 | GNU Mailutils 0.5/0.6 memory corruption (EDB-1123 / Nessus ID 18519)
5 months ago
A vulnerability, which was classified as critical, was found in GNU Mailutils 0.5/0.6. Affected is an unknown function. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2005-1523. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com