Aggregator
CVE-2023-37033 | Linux Foundation Magma up to 1.8.0 S1AP Packet EUTRAN_CGI null pointer dereference
CVE-2023-37032 | Linux Foundation Magma up to 1.8.0 Mobile Management Entity stack-based overflow
CVE-2023-37039 | Linux Foundation Magma up to 1.8.0 Mobile Management Entity RRC Establishment Clause null pointer dereference
CVE-2023-37029 | Linux Foundation Magma up to 1.8.0 Base Station assertion
CVE-2024-24424 | Linux Foundation Magma up to 1.8.0 NAS Packet decode_access_point_name_ie assertion
CVE-2024-24420 | Linux Foundation Magma up to 1.8.0 NAS Packet decode_linked_ti_ie assertion
CVE-2023-37032 | Linux Foundation Magma up to 1.8.0 Mobile Management Entity stack-based overflow
CVE-2023-37024 | Linux Foundation Magma up to 1.8.0 Emergency Number List assertion
CVE-2024-24419 | Linux Foundation Magma up to 1.8.0 NAS Packet 3gpp_24.008_sm_ies.c decode_traffic_flow_template_packet_filter buffer overflow
CVE-2024-24416 | Linux Foundation Magma up to 1.8.0 NAS Packet 3gpp_24.008_sm_ies.c decode_access_point_name_ie buffer overflow
CVE-2024-24418 | Linux Foundation Magma up to 1.8.0 NAS Packet /nas/ies/PdnAddress.cpp decode_pdn_address buffer overflow
Security Researchers Discover Critical RCE Vulnerability, Earned $40,000 Bounty
Cybersecurity researchers Abdullah Nawaf and Orwa Atyat, successfully escalated a limited path traversal vulnerability into a full-blown remote code execution (RCE). Their discovery earned a massive $40,000 bounty from the targeted organization’s bug bounty program. The team documented their step-by-step approach, leaving the cybersecurity community with valuable lessons on persistence, creativity, and methodical bug hunting. […]
The post Security Researchers Discover Critical RCE Vulnerability, Earned $40,000 Bounty appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
RansomHub
实力铸就荣誉:CACTER 2024年度荣誉盘点
实力铸就荣誉:CACTER 2024年度荣誉盘点
China-aligned PlushDaemon APT compromises supply chain of Korean VPN
ESET researchers have uncovered a supply chain attack targeting a South Korean VPN provider, carried out by PlushDaemon, a newly identified China-aligned APT group. In this cyberespionage campaign, the attackers compromised the legitimate installer, replacing it with a malicious version that deployed the group’s custom backdoor, SlowStepper. This sophisticated backdoor boasts a toolkit with over 30 components. Since at least 2019, PlushDaemon has conducted espionage operations against individuals and organizations in China, Taiwan, Hong Kong, … More →
The post China-aligned PlushDaemon APT compromises supply chain of Korean VPN appeared first on Help Net Security.