Security
Headlines
HeadlinesLatestCVEs

Tag

#git

GHSA-7w47-3wg8-547c: gix traversal outside working tree enables arbitrary code execution

### Summary During checkout, gitoxide does not verify that paths point to locations in the working tree. A specially crafted repository can, when cloned, place new files anywhere writable by the application. ### Details Although `gix-worktree-state` checks for collisions with existing files, it does not itself check if a path is really in the working tree when performing a checkout, nor do the path checks in `gix-fs` and `gix-worktree` prevent this. Cloning an untrusted repository containing specially crafted tree or blob names will create new files outside the repository, or inside the repository or a submodule's `.git` directory. The simplest cases are: - A tree named `..` to traverse upward. This facilitates arbitrary code execution because files can be placed in one or more locations where they are likely to be executed soon. - A tree named `.git` to enter a `.git` directory. This facilitates arbitrary code execution because hooks can be installed. A number of alternatives tha...

ghsa
#vulnerability#mac#windows#apple#microsoft#git
Teslas Can Still Be Stolen With a Cheap Radio Hack—Despite New Keyless Tech

Ultra-wideband radio has been heralded as the solution for “relay attacks” that are used to steal cars in seconds. But researchers found Teslas equipped with it are as vulnerable as ever.

Kelp DAO Secures $9 Million in Private Sale for Restaking Innovations

By Owais Sultan Kelp DAO, a liquid restaking platform, today announced the closure of a $9 million private sale round, a… This is a post from HackRead.com Read the original post: Kelp DAO Secures $9 Million in Private Sale for Restaking Innovations

From trust to trickery: Brand impersonation over the email attack vector

Cisco recently developed and released a new feature to detect brand impersonation in emails when adversaries pretend to be a legitimate corporation.

Breakthrough for Solv Protocol: $1 Billion TVL, Now a Top 32 DeFi Player

By Uzair Amir New York City, May 22 – Solv Protocol, a unified yield and liquidity layer for major digital assets,… This is a post from HackRead.com Read the original post: Breakthrough for Solv Protocol: $1 Billion TVL, Now a Top 32 DeFi Player

Criminal record database of millions of Americans dumped online

A notorious cybercriminal involved in breaches has released a database containing 70 million US criminal records.

The Ultimate SaaS Security Posture Management Checklist, 2025 Edition

Since the first edition of The Ultimate SaaS Security Posture Management (SSPM) Checklist was released three years ago, the corporate SaaS sprawl has been growing at a double-digit pace. In large enterprises, the number of SaaS applications in use today is in the hundreds, spread across departmental stacks, complicating the job of security teams to protect organizations against

Optimizing LMS Integration: 7 Strategies for Enhanced Blended Learning

By Uzair Amir Blended learning, a method that melds in-person teaching with online learning, has become increasingly popular recently. This innovative… This is a post from HackRead.com Read the original post: Optimizing LMS Integration: 7 Strategies for Enhanced Blended Learning

Microsoft AI “Recall” feature records everything, secures far less

Microsoft unveiled an AI search tool on new laptops that will require regular screenshots of all device activity to be recorded and stored.

GHSA-qv6x-53jj-vw59: NASA AIT-Core uses unencrypted channels to exchange data over the network

NASA AIT-Core v2.5.2 was discovered to use unencrypted channels to exchange data over the network, allowing attackers to execute a man-in-the-middle attack.