Aggregator
X-37B 将测试量子惯性传感器
CVE-2025-9434 | 1000projects Online Project Report Submission and Evaluation System edit_title.php?id=1 cross site scripting
CVE-2025-9433 | mtons mblog up to 3.5.0 Admin Panel /admin/user/list Name cross site scripting (ICPMMW)
CVE-2025-9432 | mtons mblog up to 3.5.0 Admin Panel /admin/post/list Title cross site scripting (ICPMMQ)
CVE-2025-9431 | mtons mblog up to 3.5.0 /search kw cross site scripting (ICPMML)
CVE-2025-9430 | mtons mblog up to 3.5.0 /admin/options/update input cross site scripting (ICPMMF)
Submit #634184: 1000projects.org Online Project Report Submission and Evaluation System v1.0 Cross Site Scripting [Accepted]
89 Million Steam Accounts Compromised: Change Your Password Now
89 million Steam accounts breached! Learn how to secure your account and protect your data. Act now to safeguard your gaming identity.
The post 89 Million Steam Accounts Compromised: Change Your Password Now appeared first on Security Boulevard.
熵裂·弥合丨腾讯2025上半年漏洞态势报告
CVE-2025-9429 | mtons mblog up to 3.5.0 Post /post/submit content/title/ cross site scripting (ICPMLJ/ICPMLW)
Chinese Hacker Sentenced for Kill Switch Attack on Ohio Firm’s Global Network
A federal court has handed down a four-year prison term to a former software developer who sabotaged his employer’s global network with a custom “kill switch,” crippling operations and inflicting hundreds of thousands in losses. Davis Lu, 55, a Chinese national legally residing and working in Houston, was sentenced on August 21 by U.S. District […]
The post Chinese Hacker Sentenced for Kill Switch Attack on Ohio Firm’s Global Network appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Submit #634169: mtons https://gitee.com/mtons/mblog <=3.5.0 Reflected XSS [Accepted]
Submit #634158: mtons https://gitee.com/mtons/mblog <=3.5.0 Reflected XSS [Accepted]
Submit #634157: mtons https://gitee.com/mtons/mblog <=3.5.0 Reflected XSS [Accepted]
Submit #634156: mtons https://gitee.com/mtons/mblog <=3.5.0 Stored XSS [Accepted]
Unmasking KorPlug Malware: TTPs, Control Flow, and Exposed IOCs
As part of the ongoing analysis of the KorPlug malware family, this second installment focuses on the complex second-stage payload, expanding on earlier discoveries of DLL side-loading methods that use legitimate programs to execute code initially. The payload, a malicious DLL with SHA-256 hash b6b239fe0974cf09fe8ee9bc5d0502174836a79c53adccdbb1adeb1f15c6845c, measures 638,976 bytes (624 KB) and is structured as an […]
The post Unmasking KorPlug Malware: TTPs, Control Flow, and Exposed IOCs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.