Aggregator
CVE-2025-53855 | GCC Productions Fade In 4.2.0 XML Parser out-of-bounds write (TALOS-2025-2250 / EUVD-2025-36500)
CVE-2025-54119 | ADOdb up to 5.22.9 Table Name metaColumns/metaForeignKeys/metaIndexes sql injection (GHSA-vf2r-cxg9-p7rf / EUVD-2025-23567)
CVE-2025-54401 | Planet WGR-500 1.3411b190912 formPingCmd submit-url stack-based overflow (TALOS-2025-2226 / EUVD-2025-32067)
CVE-2025-54402 | Planet WGR-500 1.3411b190912 formPingCmd submit-url/ipaddr stack-based overflow (TALOS-2025-2226 / EUVD-2025-32064)
CVE-2025-54400 | Planet WGR-500 1.3411b190912 formPingCmd counts stack-based overflow (TALOS-2025-2226 / EUVD-2025-32066)
CVE-2025-54403 | Planet WGR-500 1.3411b190912 swctrl new_password os command injection (TALOS-2025-2227 / EUVD-2025-32063)
CVE-2025-54404 | Planet WGR-500 1.3411b190912 swctrl new_device_name os command injection (TALOS-2025-2227 / EUVD-2025-32065)
CVE-2025-54405 | Planet WGR-500 1.3411b190912 formPingCmd ipaddr os command injection (TALOS-2025-2229 / EUVD-2025-32062)
CVE-2025-54406 | Planet WGR-500 1.3411b190912 formPingCmd counts os command injection (TALOS-2025-2229 / EUVD-2025-32068)
NDSS 2025 – VulShield: Protecting Vulnerable Code Before Deploying Patches
SESSION Session 1D: System-Level Security
Authors, Creators & Presenters: Yuan Li (Zhongguancun Laboratory & Tsinghua University), Chao Zhang (Tsinghua University & JCSS & Zhongguancun Laboratory), Jinhao Zhu (UC Berkeley), Penghui Li (Zhongguancun Laboratory), Chenyang Li (Peking University), Songtao Yang (Zhongguancun Laboratory), Wende Tan (Tsinghua University)
PAPER
VulShield: Protecting Vulnerable Code Before Deploying Patches
Despite the high frequency of vulnerabilities exposed in software, patching these vulnerabilities remains slow and challenging, which leaves a potential attack window. To mitigate this threat, researchers seek temporary solutions to prevent vulnerabilities from being exploited or triggered before they are officially patched. However, prior approaches have limited protection scope, often require code modification of the target vulnerable programs, and rely on recent system features. These limitations significantly reduce their usability and practicality. In this work, we introduce VulShield, an automated temporary protection system that addresses these limitations. VulShield leverages sanitizer reports, and automatically generates security policies that describe the vulnerability triggering conditions. The policies are then enforced through a Linux kernel module that can efficiently detect and prevent vulnerability from being triggered or exploited at runtime. By carefully designing the kernel module, VulShield is capable of protecting both vulnerable kernels and user-space programs running on them. It does not rely on recent system features like eBPF and Linux security modules. VulShield is also pluggable and non-invasive as it does not need to modify the code of target vulnerable software. We evaluated VulShield's capability in a comprehensive set of vulnerabilities in 9 different types and found that VulShield mitigated all cases in an automated and effective manner. For Nginx, the latency introduced per request does not exceed 0.001 ms, while the peak performance overhead observed in UnixBench is 1.047%.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the organization’s’ YouTube channel.
The post NDSS 2025 – VulShield: Protecting Vulnerable Code Before Deploying Patches appeared first on Security Boulevard.
How Ransomware Attacks Leverage Cyber Insurance Policies
Ransomware attacks continue to evolve into sophisticated strategic and psychological operations. Threat actors are always seeking ways to maximize their illicit gains, and they’ve now discovered a powerful piece to leverage: a company’s cyber insurance policy. When attackers gain access to cyber policy details, they come to a ransomware negotiation already holding some of their..
The post How Ransomware Attacks Leverage Cyber Insurance Policies appeared first on Security Boulevard.
Lawmakers ask FTC to probe Flock Safety’s cybersecurity practices
Prosecutors allege incident response pros used ALPHV/BlackCat to commit string of ransomware attacks
The alleged cybersecurity turncoats attacked at least five U.S. companies while working for their respective employers, officials said.
The post Prosecutors allege incident response pros used ALPHV/BlackCat to commit string of ransomware attacks appeared first on CyberScoop.