Tag: vulnerability discovery

  • Hacker News: Next.js and the corrupt middleware: the authorizing artifact

    Source URL: https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware Source: Hacker News Title: Next.js and the corrupt middleware: the authorizing artifact Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses a critical security vulnerability discovered in Next.js, a widely used JavaScript framework, specifically regarding its middleware functionality. The vulnerability allows unauthorized access by manipulating request headers, which could…

  • Google Online Security Blog: Vulnerability Reward Program: 2024 in Review

    Source URL: http://security.googleblog.com/2025/03/vulnerability-reward-program-2024-in.html Source: Google Online Security Blog Title: Vulnerability Reward Program: 2024 in Review Feedly Summary: AI Summary and Description: Yes Summary: The text discusses Google’s Vulnerability Reward Program (VRP) for 2024, highlighting its financial support for security researchers and improvements to the program. Notable enhancements include revamped reward structures for mobile, Chrome, and…

  • The Register: Microsoft signed a dodgy driver and now ransomware scum are exploiting it

    Source URL: https://www.theregister.com/2025/03/04/paragon_partition_manager_ransomware_driver/ Source: The Register Title: Microsoft signed a dodgy driver and now ransomware scum are exploiting it Feedly Summary: Five flaws found in Paragon Partition Manager’s kernel-level .sys Ransomware crooks are exploiting a third-party Windows kernel-level driver used and provided by disk management tool Paragon Partition Manager.… AI Summary and Description: Yes Summary:…

  • Cisco Talos Blog: ClearML and Nvidia vulns

    Source URL: https://blog.talosintelligence.com/clearml-and-nvidia-vulns/ Source: Cisco Talos Blog Title: ClearML and Nvidia vulns Feedly Summary: Cisco Talos’ Vulnerability Discovery & Research team recently disclosed two vulnerabilities in ClearML and four vulnerabilities in Nvidia. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy.   For Snort…

  • The Register: Critical PostgreSQL bug tied to zero-day attack on US Treasury

    Source URL: https://www.theregister.com/2025/02/14/postgresql_bug_treasury/ Source: The Register Title: Critical PostgreSQL bug tied to zero-day attack on US Treasury Feedly Summary: High-complexity bug unearthed by infoseccers, as Rapid7 probes exploit further A high-severity SQL injection bug in the PostgreSQL interactive tool was exploited alongside the zero-day used to break into the US Treasury in December, researchers say.……

  • Cisco Talos Blog: Small praise for modern compilers – A case of Ubuntu printing vulnerability that wasn’t

    Source URL: https://blog.talosintelligence.com/small-praise-for-modern-compilers-a-case-of-ubuntu-printing-vulnerability-that-wasnt/ Source: Cisco Talos Blog Title: Small praise for modern compilers – A case of Ubuntu printing vulnerability that wasn’t Feedly Summary: By Aleksandar NikolichEarlier this year, we conducted code audits of the macOS printing subsystem, which is heavily based on the open-source CUPS package. During this investigation, IPP-USB protocol caught our attention.…

  • The Cloudflare Blog: QUIC action: patching a broadcast address amplification vulnerability

    Source URL: https://blog.cloudflare.com/mitigating-broadcast-address-attack/ Source: The Cloudflare Blog Title: QUIC action: patching a broadcast address amplification vulnerability Feedly Summary: Cloudflare was recently contacted by researchers who discovered a broadcast amplification vulnerability through their QUIC Internet measurement research. We’ve implemented a mitigation. AI Summary and Description: Yes **Summary:** This text discusses a recently discovered vulnerability in Cloudflare’s…

  • The Register: Google: How to make any AMD Zen CPU always generate 4 as a random number

    Source URL: https://www.theregister.com/2025/02/04/google_amd_microcode/ Source: The Register Title: Google: How to make any AMD Zen CPU always generate 4 as a random number Feedly Summary: Malicious microcode vulnerability discovered, fixes rolling out for Epycs at least Googlers have not only figured out how to break AMD’s security – allowing them to load unofficial microcode into its…