Aggregator
Submit #623635: tcpreplay tcpprep tcpreplay version 6fcbf03 (the newest master in https://github.com/appneta/tcpreplay) Heap Buffer Overflow [Accepted]
CVE-2025-24293 | activestorage Gem on Ruby command injection
CVE-2025-5941 | Netskope Client up to 128.0.0 NS Client out-of-bounds (nskpsa-2025-001)
CVE-2025-0309 | Netskope Client up to 128.x Server Connection Endpoint certificate validation
CVE-2025-5942 | Netskope Client up to 126.0.8/128.x on Windows epdlpdrv.sys heap-based overflow (nskpsa-2025-003)
CVE-2025-55193 | activerecord Gem prior 7.1.5.2/7.2.2.2/8.0.2.1 on Rails ANSI escape, meta, or control sequences (GHSA-76r7-hhxj-r776)
CVE-2025-55199 | Helm up to 3.18.4 JSON Schema File /dev/zero ref allocation of resources (GHSA-9h84-qmv7-982p)
Xerox FreeFlow Core Vulnerability Allows Remote Code Execution — PoC Now Public
Security researchers have disclosed critical vulnerabilities in Xerox FreeFlow Core that enable unauthenticated remote attackers to execute arbitrary code on vulnerable systems. The proof-of-concept exploits are now publicly available, raising immediate concerns for organizations using the popular print orchestration platform. Critical Vulnerabilities Discovered Cybersecurity firm Horizon3.ai discovered two severe vulnerabilities in Xerox FreeFlow Core: an […]
The post Xerox FreeFlow Core Vulnerability Allows Remote Code Execution — PoC Now Public appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-55198 | Helm up to 3.18.4 YAML File Parser uninitialized resource (GHSA-f9f8-9pmf-xv68)
CVE-2024-7402 | Netskope Client up to 123.0.15/126.0.8/128.x integrity check (kpsa-2024-002)
CVE-2025-55194 | Part-DB Server up to 1.17.2 User Management Interface uncaught exception (GHSA-7rv3-rcxv-69ww)
CVE-2025-55196 | external-secrets up to 0.19.1 access control (GHSA-fcxq-v2r3-cc8h)
CVE-2025-55197 | py-pdf pypdf up to 5.x resource consumption (GHSA-7hfw-26vp-jp8m)
VexTrio Hackers Attacking Users via Fake CAPTCHA Robots and Malicious Apps into Google Play and App Store
A sophisticated cybercriminal organization known as VexTrio has been orchestrating a massive fraud empire through deceptive CAPTCHA robots and malicious applications distributed across Google Play and the App Store. This criminal network, operating for over 15 years, has successfully infiltrated legitimate app stores with fraudulent software that has collectively garnered over one million downloads, while […]
The post VexTrio Hackers Attacking Users via Fake CAPTCHA Robots and Malicious Apps into Google Play and App Store appeared first on Cyber Security News.
Akamai bmp solver offline every bmp to 4.0.1
Open-source flow monitoring with SENSOR: Benefits and trade-offs
Flow monitoring tools are useful for tracking traffic patterns, planning capacity, and spotting threats. But many off-the-shelf solutions come with steep licensing costs and hardware demands, especially if you want to process every packet. A research team at the University of Tübingen has built an alternative: an open-source, cost-effective, and distributed platform for collecting unsampled IPFIX data. Their system, called SENSOR, uses open-source software and vendor-agnostic components to monitor traffic at multiple points in the … More →
The post Open-source flow monitoring with SENSOR: Benefits and trade-offs appeared first on Help Net Security.