Articles tagged with: #buffer-overflow Clear filter
PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability

PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability

Cyber Security News cybersecuritynews.com

A proof-of-concept (PoC) exploit has been released for a critical vulnerability chain in VMware Workstation that allows an attacker to escape from a guest virtual machine and execute arbitrary code on the host operating system. The exploit successfully chains together an information leak and a stack-based buffer overflow vulnerability to achieve a full guest-to-host escape,

CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks

CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks

Cyber Security News cybersecuritynews.com

Cisco's Simple Network Management Protocol (SNMP) implementations in IOS and IOS XE have come under intense scrutiny following reports of active exploitation in the wild. First disclosed in August 2025, CVE-2025-20352 describes a critical buffer overflow in the SNMP engine that allows unauthenticated remote attackers to execute arbitrary code. The vulnerability arises when an oversized

CISA Adds Five Known Exploited Vulnerabilities to Catalog

CISA Adds Five Known Exploited Vulnerabilities to Catalog

All CISA Advisories www.cisa.gov

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2021-21311 Adminer Server-Side Request Forgery Vulnerability CVE-2025-20352 Cisco IOS and IOS XE Stack-based Buffer Overflow Vulnerability CVE-2025-10035 Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability CVE-2025-59689 Libraesva Email Security Gateway Command Injection Vulnerability CVE-2025-32463 Sudo Inclusion of Functionality from...

Bye bye Kerberos FTP

Bye bye Kerberos FTP

daniel.haxx.se daniel.haxx.se

We are dropping support for this feature in curl 8.17.0. Kerberos5 FTP to be exact. The last Kerberos support we had for FTP. Badness On September 16, 2025 we received a security report that accurately identified a possible stack based buffer overflow in the Kerberos FTP code that could allow a malicious FTP server cause ...

Hitachi Energy RTU500 Series

Hitachi Energy RTU500 Series

All CISA Advisories www.cisa.gov

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.2 ATTENTION : Exploitable remotely/low attack complexity Vendor : Hitachi Energy Equipment : RTU500 series Vulnerabilities : NULL Pointer Dereference, Improper Validation of Integrity Check Value, Improper Restriction of XML External Entity Reference, Heap-based Buffer Overflow, Integer Overflow or Wraparound, Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion'), Stack-based Buffer Overflow 2. RISK EVALUATION Successful...

ABB Cylon Aspect BMS/BAS

ABB Cylon Aspect BMS/BAS

All CISA Advisories www.cisa.gov

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION : Exploitable remotely/low attack complexity Vendor : ABB Equipment : ASPECT, NEXUS, MATRIX Vulnerabilities : Authentication Bypass Using an Alternate Path or Channel, Missing Authentication for Critical Function, Classic Buffer Overflow 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to assume control of the target device or perform a denial-of-service (DoS) attack. 3. TECHNICAL DETAILS 3.1...

Windows Heap-based Buffer Overflow Vulnerability Let Attackers Elevate Privileges

Windows Heap-based Buffer Overflow Vulnerability Let Attackers Elevate Privileges

Cyber Security News cybersecuritynews.com

A recently patched vulnerability in a core Windows driver could allow a local attacker to execute code with the highest system privileges, effectively taking full control of a target machine. The flaw, identified as CVE-2025-53149, is a heap-based buffer overflow discovered in the Kernel Streaming WOW Thunk Service Driver (ksthunk.sys). Microsoft addressed the issue in

ShadowScope: GPU Monitoring and Validation via Composable Side Channel Signals

ShadowScope: GPU Monitoring and Validation via Composable Side Channel Signals

cs.CR updates on arXiv.org arxiv.org

arXiv:2509.00300v1 Announce Type: new Abstract: As modern systems increasingly rely on GPUs for computationally intensive tasks such as machine learning acceleration, ensuring the integrity of GPU computation has become critically important. Recent studies have shown that GPU kernels are vulnerable to both traditional memory safety issues (e.g., buffer overflow attacks) and emerging microarchitectural threats (e.g., Rowhammer attacks), many of which manifest as anomalous execution behaviors...

Delta Electronics COMMGR

Delta Electronics COMMGR

All CISA Advisories www.cisa.gov

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.8 ATTENTION : Exploitable remotely/low attack complexity Vendor : Delta Electronics Equipment : COMMGR Vulnerabilities : Stack-based Buffer Overflow, Code Injection 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Delta Electronics COMMGR are affected: COMMGR: Versions v2.9.0 and prior 3.2 VULNERABILITY OVERVIEW 3.2.1...

HEVD Exploits - Learning Windows kernel exploitation

HEVD Exploits - Learning Windows kernel exploitation

cybersecurity www.reddit.com

Hey everyone, I recently started diving into Windows Kernel Exploitation and have been playing around with the HackSys Extreme Vulnerable Driver (HEVD) for practice. So far, I've written a couple of exploits: Stack-based buffer overflow Null-pointer dereference It's been a great way to get hands-on experience with kernel internals and how kernel drivers can be exploited. I'm planning to add more exploits and writeups as I learn. I'd love to hear your tips or experiences! The repo:...