-
CVE-2025-0222 – IObit Protected Folder Null Pointer Dereference Vulnerability
CVE ID : CVE-2025-0222 Published : Jan. 5, 2025, 4:15 p.m. | 2 hours, 58 minutes ago Description : A vulnerability was found in IObit Protected Folder up to 13.6.0.5 and classified as problematic. This issue affects the function 0x8001E000/0x8001E004 in the library IUProcessFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. An…
-
CVE-2025-0220 – Trimble SPS851 Ethernet Configuration Menu Cross-Site Scripting Vulnerability
CVE ID : CVE-2025-0220 Published : Jan. 5, 2025, 1:15 p.m. | 5 hours, 58 minutes ago Description : A vulnerability, which was classified as problematic, was found in Trimble SPS851 488.01. This affects an unknown part of the component Ethernet Configuration Menu. The manipulation of the argument Hostname leads to cross site scripting. It is possible…
-
CVE-2024-13141 – “osuuu LightPicture Cross-Site Scripting”
CVE ID : CVE-2024-13141 Published : Jan. 5, 2025, 3:15 p.m. | 3 hours, 58 minutes ago Description : A vulnerability classified as problematic was found in osuuu LightPicture up to 1.2.2. This vulnerability affects unknown code of the file /api/upload of the component SVG File Upload Handler. The manipulation of the argument file leads to cross…
-
CVE-2024-13140 – Emlog Pro Cross-Site Scripting Vulnerability in Cover Upload Handler
CVE ID : CVE-2024-13140 Published : Jan. 5, 2025, 12:15 p.m. | 6 hours, 58 minutes ago Description : A vulnerability classified as problematic has been found in Emlog Pro up to 2.4.3. Affected is an unknown function of the file /admin/article.php?action=upload_cover of the component Cover Upload Handler. The manipulation of the argument image leads to cross…
-
TheCyberThrone Security Weekly Review – January 04, 2025
TheCyberThrone Security Weekly Review – January 04, 2025 Welcome to TheCyberThrone cybersecurity week in review will be posted covering the important security happenings. This review is for the week ending Saturday, January 04, 2025.CVE-2024-56512 impacts A … Read more Published Date: Jan 05, 2025 (6 hours, 26 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-11944…
-
Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell
ePrint Report: Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell Wouter Legiest, Jan-Pieter D’Anvers, Bojan Spasic, Nam-Luc Tran, Ingrid Verbauwhede This paper presents a novel approach to calculating the Levenshtein (edit) distance within the framework of Fully Homomorphic Encryption (FHE), specifically targeting third-generation schemes like TFHE. Edit distance computations are essential in…
-
Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms
ePrint Report: Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms José Reis, Mehmet Ugurbil, Sameer Wagh, Ryan Henry, Miguel de Vega This paper introduces new protocols for secure multiparty computation (MPC) leveraging Discrete Wavelet Transforms (DWTs) for computing nonlinear functions over large domains. By employing DWTs, the protocols significantly reduce the overhead typically…
-
A Survey to Zero-Knowledge Interactive Verifiable Computing: Utilizing Randomness in Low-Degree Polynomials
ePrint Report: A Survey to Zero-Knowledge Interactive Verifiable Computing: Utilizing Randomness in Low-Degree Polynomials Angold Wang This survey provides a comprehensive examination of zero-knowledge interactive verifiable computing, emphasizing the utilization of randomnes in low-degree polynomials. We begin by tracing the evolution of general-purpose verifiable computing, starting with the foundational concepts of complexity theory developed in…
-
Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust
ePrint Report: Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust Merve Karabulut, Reza Azarderakhsh Side-channel attacks (SCA) pose a significant threat to cryptographic implementations, including those designed to withstand the computational power of quantum computers. This paper introduces the first side-channel attack on an industry-grade post-quantum cryptography implementation, Adam’s Bridge.…
-
A Combinatorial Approach to IoT Data Security
ePrint Report: A Combinatorial Approach to IoT Data Security Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar This article explores the potential of Secret Sharing-Based Internet of Things (SBIoT) as a promising cryptographic element across diverse applications, including secure data storage in commercial cloud systems (Datachest), smart home environments (encompassing sensors, cameras, smart locks,…