Aggregator
Personal information handling and transparency
1 day 2 hours ago
Canadian Centre for Cyber Security
How SentinelOne’s AI EDR Autonomously Discovered and Stopped Anthropic’s Claude from Executing a Zero Day Supply Chain Attack, Globally
1 day 2 hours ago
Read our blog post to learn how SentinelOne’s AI EDR autonomously stopped a global LiteLLM supply chain attack before execution.
SentinelOne
WIndows x64 ShellCode开发 第一章 x64基础与简单x64程序
1 day 2 hours ago
本文为 Windows x64 ShellCode 开发系列第一章,讲解 x64 汇编基础与纯汇编实现ShellCode 编写流程。文章基于 NASM 汇编语法,从 TEB/PEB 遍历出发,手动定位 kernel32.dll 基址,解析 PE 导出表实现函数地址动态查询;适合 Windows 漏洞利用、ShellCode 开发学习。
Crypto industry may be running out of time to prepare for quantum attacks
1 day 2 hours ago
Google’s latest research suggests the cryptocurrency industry may have less time than expected to prepare for quantum computing. In a whitepaper, Google examines risks to elliptic curve cryptography, the system securing most blockchain networks. The researchers revisit earlier assumptions about how difficult it would be for a quantum computer to break these protections, concluding that the required resources may be lower than previously estimated. “To share this research responsibly, we engaged with the U.S. government … More →
The post Crypto industry may be running out of time to prepare for quantum attacks appeared first on Help Net Security.
Sinisa Markovic
CVE-2026-30284 | UXGROUP Voice Recorder 10.0 privilege escalation (ID 25 / EUVD-2026-17520)
1 day 2 hours ago
A vulnerability was found in UXGROUP Voice Recorder 10.0. It has been classified as critical. This issue affects some unknown processing. This manipulation causes privilege escalation.
This vulnerability is tracked as CVE-2026-30284. The attack is only possible within the local network. No exploit exists.
vuldb.com
CVE-2026-5087 | JJNAPIORK PAGI::Middleware::Session::Store::Cookie up to 0.001003 /dev/urandom rand weak prng (EUVD-2026-17531)
1 day 2 hours ago
A vulnerability was found in JJNAPIORK PAGI::Middleware::Session::Store::Cookie up to 0.001003. It has been rated as problematic. The affected element is the function rand of the file /dev/urandom. Performing a manipulation results in cryptographically weak prng.
This vulnerability is cataloged as CVE-2026-5087. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2026-24148 | NVIDIA Jetson Xavier/Jetson Orin insecure default initialization of resource (EUVD-2026-17510)
1 day 2 hours ago
A vulnerability classified as critical has been found in NVIDIA Jetson Xavier and Jetson Orin. This impacts an unknown function. This manipulation causes insecure default initialization of resource.
This vulnerability is handled as CVE-2026-24148. The attack can be initiated remotely. There is not any exploit available.
vuldb.com
CVE-2026-24153 | NVIDIA Jetson Xavier/Jetson Orin/Jetson Thor up to 38.2 on Linux nvluks trust boundary violation (EUVD-2026-17512)
1 day 2 hours ago
A vulnerability, which was classified as problematic, has been found in NVIDIA Jetson Xavier, Jetson Orin and Jetson Thor up to 38.2 on Linux. Affected by this vulnerability is an unknown functionality of the component nvluks. Performing a manipulation results in trust boundary violation.
This vulnerability was named CVE-2026-24153. The attack may be carried out on the physical device. There is no available exploit.
vuldb.com
CVE-2026-24154 | NVIDIA Jetson Xavier/Jetson Orin/Jetson Thor up to 38.2 on Linux Command Line os command injection (EUVD-2026-17514)
1 day 2 hours ago
A vulnerability classified as critical has been found in NVIDIA Jetson Xavier, Jetson Orin and Jetson Thor up to 38.2 on Linux. Affected by this issue is some unknown functionality of the component Command Line Handler. Performing a manipulation results in os command injection.
This vulnerability is known as CVE-2026-24154. The attack may be carried out on the physical device. No exploit is available.
vuldb.com
CVE-2026-24164 | NVIDIA BioNeMo Framework deserialization (EUVD-2026-17516)
1 day 2 hours ago
A vulnerability, which was classified as critical, was found in NVIDIA BioNeMo Framework. Affected by this issue is some unknown functionality. Executing a manipulation can lead to deserialization.
The identification of this vulnerability is CVE-2026-24164. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2026-24165 | NVIDIA BioNeMo Framework deserialization (EUVD-2026-17518)
1 day 2 hours ago
A vulnerability has been found in NVIDIA BioNeMo Framework and classified as problematic. This affects an unknown part. The manipulation leads to deserialization.
This vulnerability is referenced as CVE-2026-24165. The attack can only be performed from a local environment. No exploit is available.
vuldb.com
CVE-2026-5205 | chatwoot up to 4.11.2 Webhook API lib/webhooks/trigger.rb Webhooks::Trigger url server-side request forgery (EUVD-2026-17532)
1 day 2 hours ago
A vulnerability was found in chatwoot up to 4.11.2. It has been declared as critical. Affected by this vulnerability is the function Webhooks::Trigger in the library lib/webhooks/trigger.rb of the component Webhook API. Such manipulation of the argument url leads to server-side request forgery.
This vulnerability is uniquely identified as CVE-2026-5205. The attack can be launched remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
复现 PortSwigger 2025 Top 1:SSTI 新纪元——利用“报错”侧信道偷数据
1 day 2 hours ago
一种通用的新的ssti利用方法
The official soundtrack of the 2026 Threat Detection Report
1 day 2 hours ago
Red Canary, a Zscaler company
CVE-2026-32942 | pjsip pjproject up to 2.16 use after free (ID 1451 / Nessus ID 304066)
1 day 2 hours ago
A vulnerability, which was classified as critical, was found in pjsip pjproject up to 2.16. This issue affects some unknown processing. Executing a manipulation can lead to use after free.
This vulnerability is registered as CVE-2026-32942. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
vuldb.com
CVE-2026-23322 | Linux Kernel up to 6.18.16/6.19.6/7.0-rc1 ipmi smi_work null pointer dereference (Nessus ID 304068 / WID-SEC-2026-0861)
1 day 2 hours ago
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.18.16/6.19.6/7.0-rc1. The impacted element is the function smi_work of the component ipmi. Executing a manipulation can lead to null pointer dereference.
The identification of this vulnerability is CVE-2026-23322. The attack needs to be done within the local network. There is no exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-23349 | Linux Kernel up to 6.18.16/6.19.6/7.0-rc2 HID null pointer dereference (Nessus ID 304067)
1 day 2 hours ago
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.18.16/6.19.6/7.0-rc2. The affected element is an unknown function of the component HID. The manipulation results in null pointer dereference.
This vulnerability is known as CVE-2026-23349. Access to the local network is required for this attack. No exploit is available.
You should upgrade the affected component.
vuldb.com
CVE-2026-23283 | Linux Kernel up to 6.19.6/7.0-rc1 regulator fp9931_hwmon_read memory leak (Nessus ID 304069 / WID-SEC-2026-0861)
1 day 2 hours ago
A vulnerability was found in Linux Kernel up to 6.19.6/7.0-rc1 and classified as critical. Affected is the function fp9931_hwmon_read of the component regulator. Such manipulation leads to memory leak.
This vulnerability is referenced as CVE-2026-23283. The attack needs to be initiated within the local network. No exploit is available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-33896 | digitalbazaar forge 1.3.2 Certificate Chain certificate validation (Nessus ID 304071)
1 day 2 hours ago
A vulnerability was found in digitalbazaar forge 1.3.2 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Certificate Chain Handler. The manipulation results in improper certificate validation.
This vulnerability is identified as CVE-2026-33896. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
vuldb.com