Aggregator
CVE-2025-12209 | Tenda O3 1.0.0.10(2478) /goform/setDhcpConfig SetValue/GetValue dhcpEn stack-based overflow (EUVD-2025-36067)
CVE-2025-12210 | Tenda O3 1.0.0.10(2478) /goform/AdvSetLanip SetValue/GetValue lanIp stack-based overflow (EUVD-2025-36069)
CVE-2025-12211 | Tenda O3 1.0.0.10(2478) /goform/setDmzInfo SetValue/GetValue dmzIP stack-based overflow (EUVD-2025-36074)
CVE-2025-12212 | Tenda O3 1.0.0.10(2478) setNetworkService SetValue/GetValue upnpEn stack-based overflow (EUVD-2025-36073)
«Вульгарность» — да, грубость — нет? Как изменились представления о допустимом поведении за последние 20 лет
Спор в Виндзорском замке, XVII век: можно ли пропустить куб через такой же куб? Принц доказал — да. Спустя 50 лет математики выяснили — не всегда
Crypto24
You must login to view this content
Crypto24
You must login to view this content
看似万能的 AI,其实比你想的更脆弱和邪恶
It’s Always DNS: Lessons from the AWS Outage
In episode 404 (no pun intended!) we discuss the recurring issue of DNS outages, the recent Amazon AWS disruption, and what this reveals about our dependency on cloud services. The conversation touches on the need for tested business continuity plans, the implications of DNS failures, and the misconceptions around cloud infrastructure’s automatic failover capabilities. ** […]
The post It’s Always DNS: Lessons from the AWS Outage appeared first on Shared Security Podcast.
The post It’s Always DNS: Lessons from the AWS Outage appeared first on Security Boulevard.
【已复现】Windows Server Update Service远程代码执行漏洞(CVE-2025-59287)安全风险通告
CVE-2007-3354 | NetClassifieds imageresizer.php information disclosure (EDB-30223 / XFDB-34997)
CVE-2007-3354 | Scriptdevelopers.net NetClassifieds 1.0.1/1.5.1/1.9.6.3 viewcat.php s_user_id sql injection (EDB-30223 / XFDB-34994)
CVE-2007-6634 | Netbizcity FAQMasterFlexPlus 1.5 faq.php category_id sql injection (EDB-30947 / XFDB-39286)
CVE-2007-1634 | Net Portal Dynamic 5.10 grab_globals.php db sql injection (EDB-3505 / SA24571)
CVE-2007-2537 | NPDS 5.10 mainfile.php sql injection (EDB-3855 / XFDB-34109)
CVE-2007-6633 | Netbizcity FAQMasterFlexPlus 1.5 faq.php cat_name cross site scripting (EDB-30945 / XFDB-39287)
CVE-2007-1635 | Net Portal Dynamic 5.10 privilege escalation (EDB-3505 / SA24571)
New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver
A new tool called EDR-Redir has emerged, allowing attackers to redirect or isolate the executable folders of popular Endpoint Detection and Response (EDR) solutions. Demonstrated by cybersecurity researcher TwoSevenOneT, the technique leverages Windows’ Bind Filter driver (bindflt.sys) and Cloud Filter driver (cldflt.sys) to undermine EDR protections without requiring kernel-level access. This user-mode exploit, rooted in […]
The post New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver appeared first on Cyber Security News.