Aggregator
CVE-2026-29074 | svgo up to 2.8.0/3.3.2/4.0.0 SVG File Parser xml entity expansion (Nessus ID 302193)
【已复现】泛微 E-cology10 多个远程代码执行漏洞
CVE-2026-32778 | libexpat up to 2.7.4 setContext null pointer dereference (EUVD-2026-12351 / WID-SEC-2026-0733)
CVE-2026-32777 | libexpat up to 2.7.4 infinite loop (EUVD-2026-12349 / WID-SEC-2026-0733)
CVE-2026-32776 | libexpat up to 2.7.4 null pointer dereference (EUVD-2026-12347 / WID-SEC-2026-0733)
CVE-2025-71264 | Mumble up to 1.6.869 out-of-bounds
CVE-2026-4255 | thermalright TR-VISION HOME up to 2.0.4 on Windows inclusion of functionality from untrusted control sphere (EUVD-2026-12363)
CVE-2025-52458 | OpenHarmony up to 5.1.0.x Pre-installed Apps out-of-bounds write (EUVD-2025-208681)
CVE-2025-41432 | OpenHarmony up to 5.1.0.x Pre-installed Apps out-of-bounds write
CVE-2025-25277 | OpenHarmony up to 5.1.0.x type confusion
CVE-2026-25083 | GROWI up to 7.4.5 OpenAI API Endpoint authorization
RSAC 2026创新沙盒 | Geordie AI:企业 AI Agent 安全治理体系的构建者
Manual Malice: How Handala Hack Weaponizes AI Wipers and NetBird for Rapid Network Annihilation
The Iranian syndicate designated “Handala Hack”—a collective inextricably intertwined with the Void Manticore cluster and the Iranian Ministry
The post Manual Malice: How Handala Hack Weaponizes AI Wipers and NetBird for Rapid Network Annihilation appeared first on Penetration Testing Tools.
CVE-2026-32775 | libexif up to 0.6.25 MakerNotes Decoder exif_mnote_data_get_value integer underflow (EUVD-2026-12345)
DiceCTF 2026 Quals - cornelslop: Turning an RCU Double Free into a Cross-Cache Kerel Exploit
The 30 Tbps Barrier: How AI-Powered Botnets Shattered DDoS Records in Late 2025
In the latter half of 2025, the globe endured in excess of 8 million DDoS incursions. Yet, beneath
The post The 30 Tbps Barrier: How AI-Powered Botnets Shattered DDoS Records in Late 2025 appeared first on Penetration Testing Tools.
Zero Hosting, Zero Setup: The Rise of the Browser-Native WordPress Revolution
WordPress has unveiled a novel paradigm for engaging with its platform: the my.WordPress.net service, an innovation that empowers
The post Zero Hosting, Zero Setup: The Rise of the Browser-Native WordPress Revolution appeared first on Penetration Testing Tools.
Google Looker Studio Vulnerabilities Allow Attackers to Exfiltrate Data from Google Services
A set of nine novel cross-tenant vulnerabilities in Google Looker Studio, collectively dubbed “LeakyLooker,” that could have allowed attackers to run arbitrary SQL queries, exfiltrate sensitive data, and even modify or delete records across Google Cloud environments, all without victims granting explicit permission. Google has since fully remediated all identified issues following responsible disclosure. Google […]
The post Google Looker Studio Vulnerabilities Allow Attackers to Exfiltrate Data from Google Services appeared first on Cyber Security News.