Aggregator
From Conflict to Collaboration: The Evolution of Vulnerability Disclosure
10 months ago
Critical Vulnerabilities in porte_plume plugin to Remote Exploits -$$$$ Bounty -CVE-2024–7954
10 months ago
Critical Vulnerabilities in porte_plume plugin to Remote Exploits -$$$$ Bounty -CVE-2024–7954
10 months ago
THM Smag Grotto: Learn Web Security, Privilege Escalation (Walkthrough)
10 months ago
Uncovering 0-Days: The Crucial Role of RFCs in Vulnerability Research and the Recent Windows…
10 months ago
HTB | Editorial — SSRF and CVE-2022–24439
10 months ago
Sensitive Data Leak using Cors Misconfiguration in prominent Domain Registrar
10 months ago
古尔曼:苹果AI将在18号推出;传英伟达4090显卡已停产;宋紫薇已从理想汽车离职 | 极客早知道
10 months ago
NVIDIA CEO 黄仁勋身价已超过英特尔公司总市值;消息称特斯拉计划以优质租赁为抵押,发行 7.83 亿美元的债券;美团联合创始人穆荣均套现 3.44 亿港元
CVE-2016-3140 | Linux Kernel up to 4.5.0 USB Descriptor digi_acceleport.c digi_port_init null pointer dereference (FEDORA-2016-81fd1b03aa / EDB-39537)
10 months ago
A vulnerability was found in Linux Kernel up to 4.5.0 and classified as critical. This issue affects the function digi_port_init of the file drivers/usb/serial/digi_acceleport.c of the component USB Descriptor Handler. The manipulation leads to null pointer dereference.
The identification of this vulnerability is CVE-2016-3140. Local access is required to approach this attack. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-1999-1477 | GNOME 1.0.8 --espeaker memory corruption (EDB-19512 / XFDB-3349)
10 months ago
A vulnerability was found in GNOME 1.0.8. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument --espeaker as part of Long Argument leads to memory corruption.
This vulnerability is known as CVE-1999-1477. Local access is required to approach this attack. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2009-4607 | Overlandstorage GuardianOS 5.1.041 Command Line Interface access control (EDB-9955 / XFDB-53881)
10 months ago
A vulnerability was found in Overlandstorage GuardianOS 5.1.041. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Command Line Interface. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2009-4607. Attacking locally is a requirement. Furthermore, there is an exploit available.
vuldb.com
CVE-2016-3453 | Oracle Solaris 10 Kernel denial of service (Nessus ID 92452 / ID 296004)
10 months ago
A vulnerability classified as critical was found in Oracle Solaris 10. This vulnerability affects unknown code of the component Kernel. The manipulation leads to denial of service.
This vulnerability was named CVE-2016-3453. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
RuCTF Finals 2024
10 months ago
Name: RuCTF Finals 2024 (an RuCTF Finals event.)
Date: Oct. 5, 2024, 5 a.m. — 06 Oct. 2024, 19:00 UTC [add to calendar]
Format: Attack-Defense
On-site
Location: Russia, Yekaterinburg
Offical URL: http://ructf.org/
Rating weight: 25.00
Event organizers: HackerDom
Date: Oct. 5, 2024, 5 a.m. — 06 Oct. 2024, 19:00 UTC [add to calendar]
Format: Attack-Defense
On-site
Location: Russia, Yekaterinburg
Offical URL: http://ructf.org/
Rating weight: 25.00
Event organizers: HackerDom
王平回忆录
10 months ago
原中国人民志愿军政治委员,中国人民解放军军事学院政治委员,炮兵政治委员,武汉军区第一政治委员,中国人民解放军总后勤部政治委员
CVE-2014-7447 | Dattch Dattch - The Lesbian App 0.3 X.509 Certificate cryptographic issues (VU#582497)
10 months ago
A vulnerability classified as critical has been found in Dattch Dattch - The Lesbian App 0.3. This affects an unknown part of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is uniquely identified as CVE-2014-7447. The attack can only be initiated within the local network. There is no exploit available.
vuldb.com
CVE-2013-3098 | TRENDnet TEW-812DRU -/1.0.8.0 Request Validation cross-site request forgery (Exploit 27177 / EDB-27177)
10 months ago
A vulnerability has been found in TRENDnet TEW-812DRU -/1.0.8.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Request Validation. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2013-3098. The attack can be launched remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2016-9538 | Apple macOS up to 10.12.3 tiffutil integer overflow (HT207615 / Nessus ID 96704)
10 months ago
A vulnerability classified as problematic was found in Apple macOS up to 10.12.3. This vulnerability affects unknown code of the component tiffutil. The manipulation leads to integer overflow.
This vulnerability was named CVE-2016-9538. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-9560 | ESAFENET CDG V5 Catelogs;logindojojs delCatelogs id sql injection
10 months ago
A vulnerability was found in ESAFENET CDG V5. It has been rated as critical. Affected by this issue is the function delCatelogs of the file /CDGServer3/document/Catelogs;logindojojs?command=DelCatelogs. The manipulation of the argument id leads to sql injection.
This vulnerability is handled as CVE-2024-9560. The attack may be launched remotely. Furthermore, there is an exploit available.
vuldb.com
Enhance your website's security with Cloudflare’s free security.txt generator
10 months ago
Introducing Cloudflare’s free security.txt generator, empowering all users to easily create and manage their security.txt files. This feature enhances vulnerability disclosure processes, aligns with industry standards, and is integrated into the dashboard for seamless access. Strengthen your website's security today!
Alexandra Moraru