Backlinks
| Referring page | DR | Ref. domains | Linked domains | Anchor and target URL |
|---|---|---|---|---|
|
CVE-2025-1146
https://feedly.com/cve/CVE-2025-1146
feedly.com
|
88 | 41,958 | 1,201 |
CVE 2025-1146 [app] [net]Talkback Tech / 11moCrowdStrike discovered a TLS validation flaw in Falcon sensors for Linux, Kubernetes, and Containers, fixed in versions 7.21+, with hotfixes for older versions, posing a potential man-in-the-middle risk, rated 8.1 (HIGH) severity, with no known exploitation, affecting only Linux-based sensors.
https://talkback.sh/resource/95d906f8-4e6e-4e02-85e0-37bb9e02f01a?utm_source=feedly
DOFOLLOW
|
|
CVE-2025-2000
https://feedly.com/cve/CVE-2025-2000
feedly.com
|
88 | 41,958 | 1,201 |
CVE-2025-2000 (CVSS 9.8): Qiskit SDK Vulnerability Allows Arbitrary Code ExecutionTalkback Resources / 10moA critical security vulnerability (CVE-2025-2000, CVSS 9.8) in Qiskit SDK versions 0.18.0 to 1.4.1 allows for arbitrary code execution via malicious QPY files, prompting IBM to release updates (Qiskit 1.4.2 or 2.0.0) for users to promptly upgrade and mitigate risks. A security vulnerability (CVE-2025-2000, CVSS 9.8) has been found in the Qiskit SDK, allowing potential execution of arbitrary code.
https://talkback.sh/resource/0ff5fbd5-760c-45c9-80e3-7a8fef3ae9a4?utm_source=feedly
DOFOLLOW
|
|
CVE-2025-1393
https://feedly.com/cve/CVE-2025-1393
feedly.com
|
88 | 41,958 | 1,201 |
CVE-2025-1393 (CVSS 9.8): Hard-Coded Credentials in Weidmüller PROCON-WIN Expose Industrial Systems to Attack [ics]Talkback Resources / 11moCERT@VDE issued a security advisory for a critical vulnerability in Weidmuller's PROCON-WIN industrial configuration tool (CVE-2025-1393, CVSS score 9.8) due to hard-coded credentials, allowing unauthorized access to industrial systems, with a new version (5.7.14.1) released to address the issue. CERT@VDE issued a security advisory about a critical vulnerability (
https://talkback.sh/resource/97fe0601-54ac-41d9-8b67-9308c436a12d?utm_source=feedly
DOFOLLOW
|
|
CVE-2019-0841
https://feedly.com/cve/CVE-2019-0841
feedly.com
|
88 | 41,958 | 1,201 |
(no anchor)
https://talkback.sh/resource/3207a5e5-7cdb-42c4-bbbc-b8d8a1e4297e?utm_source=feedly
DOFOLLOW
|
|
CVE-2015-0353
https://feedly.com/cve/CVE-2015-0353
feedly.com
|
88 | 41,958 | 1,201 |
Inside Forest Blizzard's New ArsenalTalkback Tech / 20moUse-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.296 and 14.x through 18.0.0.194 on Windows and OS X and 11.x through 11.2.202.468 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015. Win32k.sys in the kernel
https://talkback.sh/resource/57e3836d-6aa1-4ff4-ab89-43dc487eabe2?utm_source=feedly
DOFOLLOW
|
|
feedly.com
|
88 | 41,958 | 1,201 |
Apple plugs exploited security hole in iOS, updates macOS [app] [sys]Talkback News / 12moApple has fixed a security vulnerability in its CoreMedia component across various devices, including iPhones, iPads, Apple TVs, and macOS Sequoia Macs, addressing multiple CVEs and releasing updates for affected devices.
DOFOLLOW
|
|
CVE-2023-2822
https://feedly.com/cve/CVE-2023-2822
feedly.com
|
88 | 41,958 | 1,201 |
Ghost in the PPL Part 2: From BYOVDLL to Arbitrary Code Execution in LSASSTalkback Tech / 18moIn the previous part, I showed how a technique called “Bring Your Own Vulnerable DLL” (BYOVDLL) could be used to reintroduce known vulnerabilities in LSASS, even when it’s protected. In this second part, I’m going to discuss the strategies I considered and explored to improve my proof-of-concept, and hopefully achieve arbitrary code execution.
https://talkback.sh/resource/ecce44b6-b80c-4394-8771-23dd9ff04579?utm_source=feedly
DOFOLLOW
|
|
CVE-2023-2822
https://feedly.com/cve/CVE-2023-2822
feedly.com
|
88 | 41,958 | 1,201 |
Talkback Home
https://talkback.sh/resource/5c663396-f141-4240-8266-3d08a9ddace1
DOFOLLOW
|
|
CVE-2023-2822
https://feedly.com/cve/CVE-2023-2822
feedly.com
|
88 | 41,958 | 1,201 |
Ghost in the PPL Part 2: From BYOVDLL to Arbitrary Code Execution in LSASS – SCRT Team BlogTalkback Home / 18mo
https://talkback.sh/resource/5c663396-f141-4240-8266-3d08a9ddace1?utm_source=feedly
DOFOLLOW
|
|
CVE-2023-27944
https://feedly.com/cve/CVE-2023-27944
feedly.com
|
88 | 41,958 | 1,201 |
A New Era of macOS Sandbox Escapes: Diving into an Overlooked Attack Surface and Uncovering 10+ New Vulnerabilities [sys]Talkback Tech / 15moDiscovering and exploiting sandbox escape vulnerabilities in macOS processes, such as CVE-2023-27944 and CVE-2023-32414, can lead to full sandbox escapes and bypass security protections like SIP and TCC. New sandbox escape vulnerabilities, such as CVE-2023-27944 and CVE-2023-32414, have been discovered and exploited, leading to potential full sandbox escapes and bypass
https://talkback.sh/resource/05bb91d6-3c59-42e2-b907-b3d9097f9645?utm_source=feedly
DOFOLLOW
|
|
CVE-2023-27944
https://feedly.com/cve/CVE-2023-27944
feedly.com
|
88 | 41,958 | 1,201 |
Talkback Tech
https://talkback.sh/resource/05bb91d6-3c59-42e2-b907-b3d9097f9645
DOFOLLOW
|
|
CVE-2023-46321
https://feedly.com/cve/CVE-2023-46321
feedly.com
|
88 | 41,958 | 1,201 |
Abusing url handling in iTerm2 and Hyper for code executionTalkback Tech / 20moWhat are escape sequences
https://talkback.sh/resource/654702eb-3e79-479d-a6b9-1eeddab3db8e?utm_source=feedly
DOFOLLOW
|
|
CVE-2024-36410
https://feedly.com/cve/CVE-2024-36410
feedly.com
|
88 | 41,958 | 1,201 |
Using XSS filters against XSS filters - Unexpected SQL Injection (CVE-2024-36412) [app] [exp]Talkback Resources / 12moThe author identified multiple vulnerabilities in SuiteCRM, including SQL injection, SSRF, XSS, and RCE, leading to the discovery of additional CVEs and subsequent vendor fixes. The author discovered vulnerabilities in SuiteCRM, including SQL injection, SSRF, XSS, and RCE.
https://talkback.sh/resource/461b4322-36da-4bd8-9acf-a0fd6a2af8f9?utm_source=feedly
DOFOLLOW
|
|
CVE-2024-11982
https://feedly.com/cve/CVE-2024-11982
feedly.com
|
88 | 41,958 | 1,201 |
CVE-2024-11980 (CVSS 10): Critical Flaw in Billion Electric RoutersTalkback Resources / 14moTWCERT/CC disclosed critical vulnerabilities in Billion Electric router models, including CVE-2024-11980, allowing unauthenticated remote attackers to access sensitive information and cause denial of service, with firmware updates advised for mitigation. The critical vulnerability allows unauthenticated remote attackers to access sensitive device information, modify Wi-Fi settings, and cause denial of service by rest
https://talkback.sh/resource/71037e9c-007e-4e02-932c-a010238b666c?utm_source=feedly
DOFOLLOW
|
|
CVE-2025-32406
https://feedly.com/cve/CVE-2025-32406
feedly.com
|
88 | 41,958 | 1,201 |
High-Severity XXE Vulnerability Found in NAKIVO Backup & Replication [app] [exp] [net]Talkback Appsec / 10moNAKIVO Backup & Replication has a high-severity security vulnerability (CVE-2025-32406) allowing remote attackers to manipulate the system and potentially gain unauthorized access to sensitive data, with affected versions ranging from 10.3.x to 11.0.1; users are advised to upgrade to version 11.0.2 to mitigate the threat and protect their data. A high-severity XXE vulnerability (CVE-2025-3
https://talkback.sh/resource/3be247b8-05c4-45fa-a243-5469e53f1a19?utm_source=feedly
DOFOLLOW
|
|
CVE-2025-0498
https://feedly.com/cve/CVE-2025-0498
feedly.com
|
88 | 41,958 | 1,201 |
CVE-2025-0477 (CVSS 9.8): Critical Security Flaw in Rockwell Automation’s FactoryTalk AssetCentre [ics]Talkback News / 12moRockwell Automation issued a security advisory for critical vulnerabilities in FactoryTalk AssetCentre software, allowing attackers to extract credentials and impersonate users, posing severe risks to industrial control systems, with mitigation strategies including immediate updates and access control restrictions. Rockwell Automation's FactoryTalk AssetCentre software has critic
https://talkback.sh/resource/a3ccd399-8fd4-4248-9592-c9bc58d76928?utm_source=feedly
DOFOLLOW
|
|
CVE-2018-100881
https://feedly.com/cve/CVE-2018-100881
feedly.com
|
88 | 41,958 | 1,201 |
ROPing our way to RCE [exp] [rev]Talkback Resources / 12moIn red teaming engagements, achieving Remote Code Execution (RCE) through exploiting vulnerabilities like CVE-2022-45460 in XiongMai's uc-httpd web server used in IP cameras globally was accomplished without a reverse shell by utilizing debugging tools and understanding ARM architecture.
https://talkback.sh/resource/633d5e09-6020-4018-b234-c480b2a95a54?utm_source=feedly
DOFOLLOW
|
|
CVE-2024-4197
https://feedly.com/cve/CVE-2024-4197
feedly.com
|
88 | 41,958 | 1,201 |
(no anchor)
https://talkback.sh/resource/3e5f92cb-3fa0-4d32-82e3-3460a16a71b3?utm_source=feedly
DOFOLLOW
|
|
feedly.com
|
88 | 41,958 | 1,201 |
Talkback Tech
DOFOLLOW
|
▾
Frequently Asked Questions
How many backlinks does talkback.sh have?
The backlinks page for talkback.sh shows all individual inbound links discovered in our crawl of the web. Each backlink represents a hyperlink on another website that points to a page on talkback.sh. Use the filters to narrow results by dofollow/nofollow status, domain rating, or anchor text.
What is a backlink?
A backlink is a hyperlink on one website that points to a page on a different website. Backlinks are one of the most important ranking factors in search engine algorithms because they act as votes of confidence from other sites. The more high-quality backlinks a domain has, the more authority search engines assign to it.
Are the backlinks to talkback.sh dofollow or nofollow?
Backlinks to talkback.sh include both dofollow and nofollow links. Dofollow links pass link equity (ranking power) to the target site, while nofollow links include a rel="nofollow" attribute that tells search engines not to pass authority. Both types contribute to a natural backlink profile, but dofollow links carry more SEO weight. You can filter by link type using the rel filter above the table.
How often is backlink data updated?
Backlink data is updated monthly when our web crawler completes a new cycle. Our pipeline processes billions of web pages to discover new backlinks, track lost links, and update domain authority scores. The freshness of data depends on when our crawler last visited the referring pages.