Aggregator
手把手教你如何挖洞:CVE-2025-25257 Fortinet FortiWeb 匿名 SQL 注入漏洞动态调试实战
手把手教你如何挖洞:CVE-2025-25257 Fortinet FortiWeb 匿名 SQL 注入漏洞动态调试实战
CVE-2013-0662 | Schneider Electric Unity Pro up to 6.0 Serial Driver ModbusDrv.exe memory corruption (EDB-45219 / BID-66500)
CVE-2023-25392 | Allegro Tech BigFlow 1.6 certificate validation (EUVD-2023-1403)
CVE-2023-2240 | microweber up to 1.3.3 privileges management (EUVD-2023-1388)
CVE-2023-28475 | Concrete CMS up to 9.1 Reply Form msgID cross site scripting (EUVD-2023-1396)
CVE-2023-20866 | VMware Spring Session 3.0.0 Application Log log file (EUVD-2023-1390)
CVE-2023-31286 | Serenity Serene/StartSharp up to 6.6.x Password Reset observable response discrepancy (EUVD-2023-1404)
CVE-2023-2034 | froxlor up to 2.0.13 unrestricted upload (EUVD-2023-1383)
CVE-2023-2429 | thorsten phpmyfaq up to 3.1.12 access control (EUVD-2023-1387)
CVE-2019-11358 | Oracle Policy Automation for Mobile Devices up to 12.2.15 jQuery cross site scripting (EDB-52141 / Nessus ID 208606)
CVE-2002-2353 | tftpd32 2.50/2.50.2 Request GET/PUT access control (VU#632633 / EDB-14857)
DPC Investigates TikTok Over Transfer of EU User Data to China
The Data Protection Commission (DPC) has launched a formal inquiry into TikTok Technology Limited, scrutinizing the company’s practices regarding the transfer and storage of European Economic Area (EEA) users’ personal data to servers in China. This development stems from discrepancies uncovered in a prior investigation concluded on April 30, 2025, where TikTok asserted that EEA […]
The post DPC Investigates TikTok Over Transfer of EU User Data to China appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-7492 | PHPGurukul Vehicle Parking Management System 1.13 manage-incomingvehicle.php del sql injection (EUVD-2025-21236)
CVE-2002-2226 | TFTP32 up to 2.21 filename memory corruption (VU#632633 / EDB-22025)
COMmander: Network-Based Tool for COM and RPC Exploitation
The need for solutions that improve detection skills against sophisticated attacks is growing in the ever-changing cybersecurity world. COMmander emerges as a lightweight, C#-based utility designed to bolster defensive telemetry by monitoring Remote Procedure Call (RPC) and Component Object Model (COM) activities at a granular level. Developed to address gaps in identifying network-based exploitations involving […]
The post COMmander: Network-Based Tool for COM and RPC Exploitation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.