Aggregator
CVE-2007-3435 | RKD Software Barcode Activex 4.9 ActiveX Control barcodeax.dll BeginPrint stack-based overflow (EDB-4094 / XFDB-35011)
5 months ago
A vulnerability has been found in RKD Software Barcode Activex 4.9 and classified as very critical. Affected by this vulnerability is the function BeginPrint in the library barcodeax.dll of the component ActiveX Control. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2007-3435. The attack can be launched remotely. Furthermore, there is an exploit available.
vuldb.com
USENIX NSDI ’24 – Jolteon: Unleashing the Promise of Serverless for Serverless Workflows
5 months ago
Authors/Presenters:Zili Zhang, Chao Jin, Xin Jin
Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, placing the organizations enduring commitment to Open Access front and center. Originating from the conference’s events situated at the Hyatt Regency Santa Clara; and via the organizations YouTube channel.
The post USENIX NSDI ’24 – Jolteon: Unleashing the Promise of Serverless for Serverless Workflows appeared first on Security Boulevard.
Marc Handelman
河流的自然曲线有助于防洪
5 months ago
过去几个世纪,蜿蜒曲折的河流一直被拉直。在英国,97% 的河流被堰等人工屏障分割,平均每 1.5 公里至少有一个人工屏障。但拉直河流扰乱了水的流动,破坏水生栖息地和水质,增加了洪水风险。野生动物保护信托和野生鸟类和湿地基金会(WWT)的专家 Tom Hayek 解释说,曲折的河流改变水速和水量,减少了向下游移动的水量。河流越曲折水速就越慢,但如果河流是直的那么水就会快速直流而下,增加洪涝风险。恢复河流的自然曲线有助于减少洪水的影响,但无法预防巨大的洪水。
CVE-2014-0894 | IBM Algorithmics information disclosure (ID 127304 / EDB-33942)
5 months ago
A vulnerability, which was classified as problematic, was found in IBM Algorithmics. Affected is an unknown function. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2014-0894. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
vuldb.com
有人用就见鬼了:微软弃用Microsoft Edge内置的电子钱包/加密货币钱包功能
5 months ago
JSP3/2.0.14
CVE-2014-6927 | Myanmar Housing : mmHome 1.3 X.509 Certificate cryptographic issues (VU#582497)
5 months ago
A vulnerability, which was classified as critical, was found in Myanmar Housing : mmHome 1.3. This affects an unknown part of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is uniquely identified as CVE-2014-6927. The attack needs to be done within the local network. There is no exploit available.
vuldb.com
CVE-2015-6494 | Infinite Automation Mango Automation prior 2.6.0 Build 430 cross site scripting (EDB-38338)
5 months ago
A vulnerability was found in Infinite Automation Mango Automation. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2015-6494. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2014-6926 | paperton Allt om Brollop 1.53 X.509 Certificate cryptographic issues (VU#582497)
5 months ago
A vulnerability, which was classified as critical, has been found in paperton Allt om Brollop 1.53. Affected by this issue is some unknown functionality of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is handled as CVE-2014-6926. The attack can only be initiated within the local network. There is no exploit available.
vuldb.com
在非越狱 iOS 上实现全流量抓包
5 months ago
手机抓包小技巧分享。
New Google Chrome feature will translate complex pages in real time
5 months ago
Google is testing a new API that uses machine learning models to offer real-time language translation for inputted text and to make it easier to translate web pages. [...]
Mayank Parmar
CVE-2014-6925 | Gcspublishing Steyr Forum 3.9.12 X.509 Certificate cryptographic issues (VU#582497)
5 months ago
A vulnerability classified as critical was found in Gcspublishing Steyr Forum 3.9.12. Affected by this vulnerability is an unknown functionality of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is known as CVE-2014-6925. The attack can only be done within the local network. There is no exploit available.
vuldb.com
Weekly Update 418
5 months ago
Just watching back through bits of this week's video, the thing that's really getting at me is
CVE-2018-14497 | Tenda D152 SSID cross site scripting (EDB-45336)
5 months ago
A vulnerability, which was classified as problematic, has been found in Tenda D152. Affected by this issue is some unknown functionality of the component SSID Handler. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2018-14497. The attack may be launched remotely. Furthermore, there is an exploit available.
vuldb.com
写在34岁
5 months ago
早上醒来发现爸妈发来了生日祝福还给我转了红包,age++,不禁叹息:嗨,又老了一岁。生日对小盆友而言意味着正在向生命过程中的辉煌时期进步,而对于 30+ 奔
CVE-2014-8727 | F5 BIG-IP 10.2.1 HTTP POST Request properties.jsp name path traversal (EDB-35222 / Nessus ID 80119)
5 months ago
A vulnerability was found in F5 BIG-IP 10.2.1 and classified as problematic. Affected by this issue is some unknown functionality of the file properties.jsp of the component HTTP POST Request Handler. The manipulation of the argument name leads to path traversal.
This vulnerability is handled as CVE-2014-8727. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2016-7661 | Apple macOS up to 10.12.1 Power Management access control (HT207423 / EDB-40931)
5 months ago
A vulnerability was found in Apple macOS up to 10.12.1. It has been rated as critical. This issue affects some unknown processing of the component Power Management. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2016-7661. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 12
5 months ago
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Protect Your Crypto: Understanding the Ongoing Global Malware Attacks and What We Are Doing to Stop Them CISA warns of Windows flaw used in infostealer malware attacks Exotic SambaSpy is now dancing with Italian users Loki: […]
Pierluigi Paganini
CVE-2014-3427 | Yealink Voip Phone 28.72.0.2 Firmware model crlf injection (ID 127081 / EDB-39334)
5 months ago
A vulnerability, which was classified as critical, was found in Yealink Voip Phone 28.72.0.2. Affected is an unknown function of the component Firmware. The manipulation of the argument model leads to crlf injection.
This vulnerability is traded as CVE-2014-3427. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
vuldb.com
AntSword新增类型:JSPRAW的一些玩法
5 months ago
实战是检验真理的唯一标准。