Aggregator
【已复现】泛微 E-cology10 多个远程代码执行漏洞
CVE-2026-32778 | libexpat up to 2.7.4 setContext null pointer dereference (EUVD-2026-12351 / WID-SEC-2026-0733)
CVE-2026-32777 | libexpat up to 2.7.4 infinite loop (EUVD-2026-12349 / WID-SEC-2026-0733)
CVE-2026-32776 | libexpat up to 2.7.4 null pointer dereference (EUVD-2026-12347 / WID-SEC-2026-0733)
CVE-2025-71264 | Mumble up to 1.6.869 out-of-bounds
CVE-2026-4255 | thermalright TR-VISION HOME up to 2.0.4 on Windows inclusion of functionality from untrusted control sphere (EUVD-2026-12363)
CVE-2025-52458 | OpenHarmony up to 5.1.0.x Pre-installed Apps out-of-bounds write (EUVD-2025-208681)
CVE-2025-41432 | OpenHarmony up to 5.1.0.x Pre-installed Apps out-of-bounds write
CVE-2025-25277 | OpenHarmony up to 5.1.0.x type confusion
CVE-2026-25083 | GROWI up to 7.4.5 OpenAI API Endpoint authorization
RSAC 2026创新沙盒 | Geordie AI:企业 AI Agent 安全治理体系的构建者
Manual Malice: How Handala Hack Weaponizes AI Wipers and NetBird for Rapid Network Annihilation
The Iranian syndicate designated “Handala Hack”—a collective inextricably intertwined with the Void Manticore cluster and the Iranian Ministry
The post Manual Malice: How Handala Hack Weaponizes AI Wipers and NetBird for Rapid Network Annihilation appeared first on Penetration Testing Tools.
CVE-2026-32775 | libexif up to 0.6.25 MakerNotes Decoder exif_mnote_data_get_value integer underflow (EUVD-2026-12345)
DiceCTF 2026 Quals - cornelslop: Turning an RCU Double Free into a Cross-Cache Kerel Exploit
The 30 Tbps Barrier: How AI-Powered Botnets Shattered DDoS Records in Late 2025
In the latter half of 2025, the globe endured in excess of 8 million DDoS incursions. Yet, beneath
The post The 30 Tbps Barrier: How AI-Powered Botnets Shattered DDoS Records in Late 2025 appeared first on Penetration Testing Tools.
Zero Hosting, Zero Setup: The Rise of the Browser-Native WordPress Revolution
WordPress has unveiled a novel paradigm for engaging with its platform: the my.WordPress.net service, an innovation that empowers
The post Zero Hosting, Zero Setup: The Rise of the Browser-Native WordPress Revolution appeared first on Penetration Testing Tools.
Google Looker Studio Vulnerabilities Allow Attackers to Exfiltrate Data from Google Services
A set of nine novel cross-tenant vulnerabilities in Google Looker Studio, collectively dubbed “LeakyLooker,” that could have allowed attackers to run arbitrary SQL queries, exfiltrate sensitive data, and even modify or delete records across Google Cloud environments, all without victims granting explicit permission. Google has since fully remediated all identified issues following responsible disclosure. Google […]
The post Google Looker Studio Vulnerabilities Allow Attackers to Exfiltrate Data from Google Services appeared first on Cyber Security News.
Привет, мир и прощай, зарплата. Одна команда в консоли лишает разработчика всех уровней доступа
45,000 malicious IP addresses taken down, 94 suspects arrested
An international law enforcement operation has taken down more than 45,000 malicious IP addresses and servers linked to phishing, malware, and ransomware activity. The action was carried out as part of Operation Synergia III, an investigation that ran from July 18, 2025 to January 31, 2026. According to INTERPOL, the operation resulted in 94 arrests, while 110 additional suspects remain under investigation. Authorities also seized 212 electronic devices and servers linked to the criminal networks. … More →
The post 45,000 malicious IP addresses taken down, 94 suspects arrested appeared first on Help Net Security.