Aggregator
CVE-2025-3716 | ESET Protect prior 12.1.1.0 response discrepancy (EUVD-2025-209122)
4 days 17 hours ago
A vulnerability was found in ESET Protect and classified as problematic. The affected element is an unknown function. The manipulation results in observable response discrepancy.
This vulnerability is reported as CVE-2025-3716. The attacker must have access to the local network to execute the attack. No exploit exists.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-4416 | GIGABYTE Control Center prior 25.12.31.01 Performance Library deserialization (EUVD-2026-17071)
4 days 17 hours ago
A vulnerability has been found in GIGABYTE Control Center and classified as critical. Impacted is an unknown function of the component Performance Library. The manipulation leads to deserialization.
This vulnerability is documented as CVE-2026-4416. The attack needs to be performed locally. There is not any exploit available.
The affected component should be upgraded.
vuldb.com
Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels
4 days 17 hours ago
嗯,用户让我总结这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要快速浏览文章,抓住主要信息。
文章讲的是一个名为CTRL的远程访问工具包,由俄罗斯开发,通过伪装成私钥文件夹的恶意LNK文件传播。这个工具包的功能包括凭证钓鱼、键盘记录、RDP劫持和反向隧道。攻击链利用LNK文件启动PowerShell命令,部署恶意软件,并通过FRP隧道进行通信。此外,工具包还能发送伪装成浏览器的通知来窃取更多信息。
接下来,我需要将这些关键点浓缩到100字以内。要确保涵盖来源、传播方式、主要功能和攻击机制。同时,避免使用复杂的术语,保持简洁明了。
最后,检查字数是否符合要求,并确保没有遗漏重要信息。
研究人员发现一款源自俄罗斯的远程访问工具包CTRL,通过伪装成私钥文件夹的恶意LNK文件传播。该工具包包含多种功能模块,可实现凭证钓鱼、键盘记录、RDP劫持和反向隧道通信,并通过Fast Reverse Proxy(FRP)建立隐蔽通信通道以隐藏网络痕迹。
CVE-2026-25704 | pop-os cosmic-greeter privilege dropping (ID 426 / EUVD-2026-17067)
4 days 17 hours ago
A vulnerability, which was classified as problematic, was found in pop-os cosmic-greeter. This issue affects some unknown processing. Executing a manipulation can lead to privilege dropping / lowering errors.
This vulnerability is registered as CVE-2026-25704. The attack needs to be launched locally. No exploit is available.
You should upgrade the affected component.
vuldb.com
CVE-2026-5121 | libarchive on 32-bit ISO9660 Image Parser heap-based overflow (EUVD-2026-17073)
4 days 17 hours ago
A vulnerability, which was classified as critical, has been found in libarchive on 32-bit. This vulnerability affects unknown code of the component ISO9660 Image Parser. Performing a manipulation results in heap-based buffer overflow.
This vulnerability is cataloged as CVE-2026-5121. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2026-4415 | GIGABYTE Control Center up to 25.07.21.01 path traversal (EUVD-2026-17069)
4 days 17 hours ago
A vulnerability classified as critical was found in GIGABYTE Control Center up to 25.07.21.01. This affects an unknown part. Such manipulation leads to relative path traversal.
This vulnerability is listed as CVE-2026-4415. The attack may be performed from remote. There is no available exploit.
vuldb.com
blind ssti detection on java app, no output, no delay, how to identify template engine?
4 days 17 hours ago
嗯,用户发来了一段英文内容,看起来是关于测试一个Java后端的Web应用中的模板注入漏洞。他尝试了各种表达式,比如${7*7}、{{7*7}}等等,但都没有得到预期的结果,甚至没有错误提示。他还提到了尝试了一些盲注的方法,比如执行系统命令,但同样没有成功。
用户还注意到响应中有一个自定义的头信息X-Template,这可能暗示了使用的模板引擎类型。他不确定是Freemarker、Velocity还是Thymeleaf。他的主要问题是如何在没有输出的情况下识别使用的模板引擎,并询问是否有通用的时间盲测方法,或者是否应该先测试其他参数。
首先,我需要理解用户的需求。他可能是一个安全测试人员或开发人员,在进行应用的安全性测试时遇到了模板注入的问题。他希望找到一种方法来确定使用的模板引擎类型,并且在无法获得直接输出的情况下进行检测。
接下来,我应该考虑如何帮助他解决这个问题。可能的解决方案包括:查找模板引擎的特征响应头(如X-Template),尝试不同的注入向量以触发不同引擎的反应,或者使用时间盲测技术来检测漏洞的存在。
此外,用户提到的自定义头信息X-Template可能是一个关键线索。不同的模板引擎可能会有不同的响应头或行为模式。因此,分析这个头信息的内容可能会提供一些线索。
另外,考虑到用户尝试了多种注入方式但都没有成功,可能需要进一步分析后端的日志或错误处理机制是否存在隐藏的信息泄露。有时候,即使没有直接的输出反馈,后端的日志可能会显示注入尝试的相关信息。
最后,在总结时需要简洁明了地描述问题和可能的解决方案,并确保不超过100个字。
测试Java后端Web应用中的URL参数时发现潜在模板注入点。尝试多种表达式未果,无计算结果或错误提示。盲注攻击亦未成功。通过响应中的X-Template自定义头推测可能使用Freemarker、Velocity或Thymeleaf等模板引擎。问题在于如何在无输出情况下识别具体引擎,并询问是否存在跨多引擎的时间盲测方法或应优先测试其他参数。
systemd 配置目录介绍
4 days 17 hours ago
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读用户提供的文章内容,理解其主要信息。
文章主要介绍了systemd的配置目录结构、单元文件类型、管理命令以及配置优先级。看起来这是关于Linux系统服务管理的内容。用户可能是一位系统管理员或者开发者,正在学习如何使用systemd来管理服务。
接下来,我需要提取关键点:主要配置目录有三个,分别是/etc/systemd/system/、/usr/lib/systemd/system/和/run/systemd/system/。每个目录的作用和优先级不同。然后是单元文件类型,包括服务、路径监控、定时器和目标单元。管理命令部分提到了常用的systemctl命令,比如重载配置、启用服务等。最后是配置优先级顺序和实际应用场景。
现在我要把这些信息浓缩到100字以内。首先列出主要配置目录及其用途,然后提到单元文件类型和管理命令,最后说明应用场景和优先级顺序。
可能会这样组织语言:“介绍了 systemd 的主要配置目录(/etc/systemd/system/、/usr/lib/systemd/system/、/run/systemd/system/)、单元文件类型(.service、.path、.timer、.target)及管理命令(如 systemctl),并说明了配置优先级顺序和实际应用场景。” 这样刚好控制在100字左右,并且涵盖了所有关键点。
确认一下是否符合要求:没有使用特定的开头词,直接描述内容;控制在100字以内;涵盖主要目录、文件类型、管理命令和应用场景。看起来没问题。
介绍了 systemd 的主要配置目录(/etc/systemd/system/、/usr/lib/systemd/system/、/run/systemd/system/)、单元文件类型(.service、.path、.timer、.target)及管理命令(如 systemctl),并说明了配置优先级顺序和实际应用场景。
systemd 配置目录介绍
4 days 17 hours ago
systemd 配置目录详解 主要配置目录 1. /etc/systemd/system/ (用户自定义配置) […]
杨龙
CVE-2024-47552 | Apache Seata up to 2.1.x deserialization
4 days 17 hours ago
A vulnerability labeled as problematic has been found in Apache Seata up to 2.1.x. This impacts an unknown function. Executing a manipulation can lead to deserialization.
This vulnerability is registered as CVE-2024-47552. The attack requires access to the local network. No exploit is available.
The affected component should be upgraded.
vuldb.com
CVE-2025-32897 | Apache Seata up to 2.2.x deserialization (EUVD-2025-19540)
4 days 17 hours ago
A vulnerability described as problematic has been identified in Apache Seata up to 2.2.x. This affects an unknown part. The manipulation results in deserialization.
This vulnerability is reported as CVE-2025-32897. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-23362 | Linux Kernel up to 7.0-rc2 can bcm_tx_setup initialization (Nessus ID 303735)
4 days 17 hours ago
A vulnerability was found in Linux Kernel up to 7.0-rc2. It has been rated as critical. Affected by this vulnerability is the function bcm_tx_setup of the component can. The manipulation leads to improper initialization.
This vulnerability is referenced as CVE-2026-23362. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-23361 | Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc1 PCI dw_pcie_ep_raise_msix_irq privilege escalation (Nessus ID 303733)
4 days 17 hours ago
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc1. Affected by this issue is the function dw_pcie_ep_raise_msix_irq of the component PCI. The manipulation results in privilege escalation.
This vulnerability is identified as CVE-2026-23361. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-23369 | Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc2 i2c acpi_lock null pointer dereference
4 days 17 hours ago
A vulnerability identified as critical has been detected in Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc2. This affects the function acpi_lock of the component i2c. This manipulation causes null pointer dereference.
This vulnerability is tracked as CVE-2026-23369. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
vuldb.com
CVE-2026-23363 | Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc2 wifi mt7925_mac_write_txwi_80211 out-of-bounds
4 days 17 hours ago
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc2. Affected is the function mt7925_mac_write_txwi_80211 of the component wifi. The manipulation results in out-of-bounds read.
This vulnerability was named CVE-2026-23363. The attack needs to be approached within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-23364 | Linux Kernel up to 7.0-rc1 ksmbd memcmp timing discrepancy
4 days 17 hours ago
A vulnerability labeled as problematic has been found in Linux Kernel up to 7.0-rc1. Affected by this issue is the function memcmp of the component ksmbd. Such manipulation leads to observable timing discrepancy.
This vulnerability is referenced as CVE-2026-23364. The attack needs to be initiated within the local network. No exploit is available.
The affected component should be upgraded.
vuldb.com
CVE-2026-23365 | Linux Kernel up to 7.0-rc1 USB Endpoint denial of service
4 days 17 hours ago
A vulnerability classified as critical has been found in Linux Kernel up to 7.0-rc1. This issue affects some unknown processing of the component USB Endpoint. The manipulation leads to denial of service.
This vulnerability is listed as CVE-2026-23365. The attack must be carried out from within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2026-23366 | Linux Kernel up to 6.18.16/6.19.6/7.0-rc1 drm_client_modeset_probe null pointer dereference
4 days 17 hours ago
A vulnerability classified as critical was found in Linux Kernel up to 6.18.16/6.19.6/7.0-rc1. Impacted is the function drm_client_modeset_probe. The manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2026-23366. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-23368 | Linux Kernel up to 7.0-rc1 rtnl_lock deadlock
4 days 17 hours ago
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 7.0-rc1. The affected element is the function rtnl_lock. This manipulation causes deadlock.
This vulnerability is registered as CVE-2026-23368. The attack requires access to the local network. No exploit is available.
It is advisable to upgrade the affected component.
vuldb.com