Aggregator
小红书为什么要做「漫展」?
CVE-2024-26833 | Linux Kernel up to 5.10.210/5.15.149/6.1.79/6.6.18/6.7.6 dm_sw_fini memory leak (Nessus ID 246386)
CVE-2020-14878 | Oracle MySQL Server up to 8.0.21 LDAP Auth privilege escalation (Nessus ID 246388)
CVE-2023-52433 | Linux Kernel up to 6.5.x Netfilter nft_set_rbtree.c nft_set_rbtree dropped privileges (Nessus ID 246391)
CVE-2021-3470 | Redis up to 5.0.9/6.0.8/6.1.x out-of-bounds write (Nessus ID 246392)
CVE-2022-28796 | Linux Kernel up to 5.17.0 fs/jbd2/transaction.c jbd2_journal_wait_updates use after free (Nessus ID 246394)
CVE-2021-47555 | Linux Kernel up to 5.4.162/5.10.82/5.15.5 register_vlan_dev reference count (Nessus ID 246396)
沉浸式翻译拟禁止用户使用未认证第三方API引起众怒 现已火速删除公告
CVE-2021-2012 | Oracle MySQL Server up to 8.0.20 Privileges denial of service (Nessus ID 246401)
CVE-2021-41799 | MediaWiki up to 1.36.1 ApiQueryBacklinks resource consumption (FEDORA-2021-56d8173b5e / Nessus ID 246400)
CVE-2024-35916 | Linux Kernel up to 6.1.84/6.6.25/6.8.4 dma-buf sanitycheck null pointer dereference (Nessus ID 246402)
BitUnlocker – Multiple 0-days to Bypass BitLocker and Extract All Protected Data
Researchers have disclosed a series of critical zero-day vulnerabilities that completely bypass Windows BitLocker encryption, allowing attackers with physical access to extract all protected data from encrypted devices in a matter of minutes. The research, conducted by Alon Leviev and Netanel Ben Simon from Microsoft’s Security Testing & Offensive Research at Microsoft (STORM) team, exposes […]
The post BitUnlocker – Multiple 0-days to Bypass BitLocker and Extract All Protected Data appeared first on Cyber Security News.
CVE-2024-35981 | Linux Kernel up to 6.1.89/6.6.28/6.8.6 virtio_net ethtool_set_rxfh infinite loop (Nessus ID 246403)
CVE-2020-15659 | Mozilla Firefox/Firefox ESR/Thunderbird out-of-bounds write (Bug 1550133 / Nessus ID 246408)
CVE-2021-20239 | Linux Kernel up to 5.4.91 BPF information disclosure (Nessus ID 246407)
CVE-2021-28660 | Linux Kernel up to 5.11.6 ioctl_linux.c rtw_wx_set_scan buffer overflow (Nessus ID 246409)
DarkCloud Stealer Employs New Infection Chain and ConfuserEx-Based Obfuscation
A sophisticated information-stealing malware campaign has emerged, utilizing advanced obfuscation techniques and multiple infection vectors to evade traditional security controls. The DarkCloud Stealer, first documented in recent threat intelligence reports, represents a significant evolution in cybercriminal tactics, employing a complex multi-stage delivery mechanism that begins with seemingly innocuous archive files and culminates in the deployment […]
The post DarkCloud Stealer Employs New Infection Chain and ConfuserEx-Based Obfuscation appeared first on Cyber Security News.