Aggregator
CVE-2023-30774 | LibTIFF tiffcrop heap-based overflow (Nessus ID 240052)
CVE-2023-30775 | LibTIFF tiffcrop.c extractContigSamples32bits heap-based overflow (Nessus ID 240052)
CVE-2022-2056 | LibTIFF 4.4.0 tiffcrop divide by zero (Issue 415 / Nessus ID 240052)
CVE-2022-2057 | LibTIFF 4.4.0 tiffcrop divide by zero (Issue 427 / Nessus ID 240052)
CVE-2022-2058 | LibTIFF 4.4.0 tiffcrop divide by zero (Issue 428 / Nessus ID 240052)
CVE-2022-34526 | Tiffsplit 4.4.0 TIFF File _TIFFVGetField stack-based overflow (Issue 433 / Nessus ID 240052)
CVE-2022-2520 | libtiff 4.4.0rc1 tiffcrop.c rotateImage buffer size (Issue 424 / Nessus ID 240052)
CVE-2022-3626 | LibTIFF 4.4.0 TIFF File libtiff/tif_unix.c _TIFFmemset out-of-bounds write (Issue 426 / Nessus ID 240052)
CVE-2022-3627 | LibTIFF 4.4.0 TIFF File libtiff/tif_unix.c _TIFFmemcpy out-of-bounds write (ID 411 / Nessus ID 240052)
CVE-2022-40090 | libtiff up to 4.3.x TIFF File TIFFReadDirectory denial of service (Issue 455 / Nessus ID 240052)
CVE-2022-3598 | LibTIFF 4.4.0 TIFF File tools/tiffcrop.c extractContigSamplesShifted24bits out-of-bounds write (Issue 435 / Nessus ID 240052)
CVE-2022-3570 | LibTIFF 4.4.0 TIFF File tiffcrop.c out-of-bounds (ID 381 / Nessus ID 240052)
CVE-2022-3599 | LibTIFF 4.4.0 TIFF File tools/tiffcrop.c writeSingleSection out-of-bounds (Issue 398 / Nessus ID 240052)
Akira
You must login to view this content
Defensie versterkt maritieme slagkracht met Tomahawks
Hackers Manipulate Search Engines to Push Malicious Sites
A new wave of cybercrime is exploiting the very backbone of internet trust: search engines. Recent research by Netcraft has exposed a sophisticated and organized SEO poisoning operation, where hackers manipulate search engine algorithms to push malicious websites to the top of search results. At the heart of this campaign is a platform known as […]
The post Hackers Manipulate Search Engines to Push Malicious Sites appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Novel TokenBreak Attack Method Can Bypass LLM Security Features
Researchers with HiddenLayers uncovered a new vulnerability in LLMs called TokenBreak, which could enable an attacker to get around content moderation features in many models simply by adding a few characters to words in a prompt.
The post Novel TokenBreak Attack Method Can Bypass LLM Security Features appeared first on Security Boulevard.
Обычное фото? Скорее портал в ад. Katz Stealer маскируется лучше, чем баги перед релизом
CISA Releases Five Industrial Control Systems Advisories
CISA released five Industrial Control Systems (ICS) advisories on June 17, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-168-01 Siemens Mendix Studio Pro
- ICSA-25-168-02 LS Electric GMWin 4
- ICSA-25-168-04 Fuji Electric Smart Editor
- ICSA-25-168-05 Dover Fueling Solutions ProGauge MagLink LX Consoles
- ICSA-24-347-10 Siemens SENTRON Powercenter 1000 (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.