Aggregator
CVE-2024-48990 | needrestart up to 3.7 Environment Variable PYTHONPATH Local Privilege Escalation (Nessus ID 211606)
CVE-2024-48991 | needrestart up to 3.7 race condition (Nessus ID 211606)
CVE-2024-48992 | needrestart up to 3.7 Environment Variable RUBYLIB Local Privilege Escalation (Nessus ID 211606)
CVE-2024-10224 | Module::ScanDeps up to 1.35 Pesky Pipe os command injection (Nessus ID 211605)
CVE-2024-47076 | OpenPrinting libcupsfilters up to 2.1b1 IPP Attribute cfGetPrinterAttributes5 input validation (GHSA-rj88-6mr5-rcw8 / Nessus ID 207865)
CVE-2024-47175 | OpenPrinting libppd up to 2.1b1 buffer overflow (GHSA-rj88-6mr5-rcw8 / Nessus ID 207865)
CVE-2024-47177 | OpenPrinting cups-filters up to 2.0.1 PPD File FoomaticRIPCommandLine command injection (GHSA-rj88-6mr5-rcw8 / Nessus ID 207865)
DragonForce
银狐的反击——模拟点击放行拦截弹窗
Submit #446282: code-projects Restaurant Order System 1.0 SQL Injection [Duplicate]
Submit #446281: code-projects Hospital Management System 1.0 SQL Injection [Duplicate]
A Threat Actor Reportedly is Selling Credit Cards to an Unidentified Shop Across Multiple Countries
Submit #444738: E-Lins Technology E-Lins H685 Routers <=v3.2.337 Hard-coded Credentials [Accepted]
China's DeepSeek Aims to Rival OpenAI's 'Reasoning' Model
Chinese artificial intelligence research company DeepSeek, funded by quantitative trading firms, introduced what it says is one of the first reasoning models to rival OpenAI o1. Reasoning models engage in self-fact checking and perform multi-step reasoning tasks.
Google AI Tool Finds 26 Bugs in Open-Source Projects
Google researchers used an AI-powered fuzzing tool to identify 26 vulnerabilities in open-source code repositories, some of which had been lurking undiscovered for several decades. Each was found with AI, using AI-generated and enhanced fuzz targets, Google said.
CISA: Over Half of Top Routinely Exploited Vulnerabilities in 2023 Affected Network Devices and Infrastructure
Over half of the most routinely exploited vulnerabilities worldwide in 2023 affected network devices and infrastructure, according to a cybersecurity advisory issued by CISA and other international cybersecurity agencies in November, 2024. Furthermore, the majority of the routinely exploited vulnerabilities were “initially exploited as a zero-day” which was a change from 2022, when the majority […]
The post CISA: Over Half of Top Routinely Exploited Vulnerabilities in 2023 Affected Network Devices and Infrastructure appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.
The post CISA: Over Half of Top Routinely Exploited Vulnerabilities in 2023 Affected Network Devices and Infrastructure appeared first on Security Boulevard.