Aggregator
CVE-2023-42058 | Tracker Software PDF-XChange Editor U3D File Parser out-of-bounds (ZDI-23-1362)
CVE-2023-42061 | Tracker Software PDF-XChange Editor U3D File Parser out-of-bounds (ZDI-23-1358)
CVE-2023-42060 | Tracker Software PDF-XChange Editor U3D File Parser out-of-bounds (ZDI-23-1359)
CVE-2023-42063 | Tracker Software PDF-XChange Editor U3D File Parser out-of-bounds (ZDI-23-1357)
CVE-2023-42062 | Tracker Software PDF-XChange Editor U3D File Parser uninitialized pointer (ZDI-23-1347)
CVE-2023-42059 | Tracker Software PDF-XChange Editor U3D File Parser use after free (ZDI-23-1361)
CVE-2023-42064 | Tracker Software PDF-XChange Editor U3D File Parser out-of-bounds (ZDI-23-1346)
CVE-2023-42065 | Tracker Software PDF-XChange Editor JP2 File Parser out-of-bounds (ZDI-23-1345)
CVE-2023-42066 | Tracker Software PDF-XChange Editor J2K File Parser out-of-bounds (ZDI-23-1344)
CVE-2023-3726 | OCSInventory 2.12.0 Email Template cross site scripting
CVE-2023-32144 | D-Link DAP-1360 webproc COMM_MakeCustomMsg stack-based overflow
CVE-2023-32145 | D-Link DAP-1360 hard-coded credentials
CVE-2004-2000 | Francisco Burzi PHP-Nuke up to 7.2 modules.php orderby/sid sql injection (EDB-31283 / XFDB-16074)
VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited – Pwn2Own Day 2
Security researchers uncovered critical zero-day vulnerabilities across major enterprise platforms during the second day of Pwn2Own Berlin 2025, earning a staggering $435,000 in bounties. The competition, hosted at the OffensiveCon conference, witnessed successful exploits against VMware ESXi, Microsoft SharePoint, Mozilla Firefox, and Red Hat Enterprise Linux, demonstrating significant security gaps in widely used enterprise software. […]
The post VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited – Pwn2Own Day 2 appeared first on Cyber Security News.
Предупреждение о хакерской катастрофе — удалите все эти электронные письма с вашего ПК
CVE-2002-1911 | ZoneLabs ZoneAlarm 3.0/3.1 SYN Packet denial of service (EDB-21943 / XFDB-10379)
APT Group 123 Actively Attacking Windows Systems to Deliver Malicious Payloads
North Korean state-sponsored threat actor APT Group 123 has intensified its cyber espionage campaign, specifically targeting Windows systems across multiple sectors globally. The group, active since at least 2012 and also tracked under aliases such as APT37, Reaper, and ScarCruft, has historically focused on South Korean targets but has expanded operations to Japan, Vietnam, the […]
The post APT Group 123 Actively Attacking Windows Systems to Deliver Malicious Payloads appeared first on Cyber Security News.