Aggregator
Secure Your Spot at RSAC 2026 Conference
3 weeks 5 days hence
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
3 weeks 1 day hence
Weekly Threat Bulletin – February 25th, 2026
15 hours 31 minutes hence
These are the top threats you should know about this week.
CVE-2025-13943
1 hour 51 minutes ago
Currently trending CVE - Hype Score: 4 - A post-authentication command injection vulnerability in the log file download function of the Zyxel EX3301-T0 firmware versions through 5.50(ABVY.7)C0 could allow an authenticated attacker to execute operating system (OS) commands on an affected device.
CVE-2025-13942
1 hour 51 minutes ago
Currently trending CVE - Hype Score: 4 - A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UPnP SOAP requests.
CVE-2025-40538
1 hour 51 minutes ago
Currently trending CVE - Hype Score: 9 - A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and execute arbitrary code as a privileged account via domain admin or group admin privileges.
This issue requires administrative ...
CVE-2025-12543
1 hour 51 minutes ago
Currently trending CVE - Hype Score: 7 - A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are ...
CVE-2023-20869
1 hour 51 minutes ago
Currently trending CVE - Hype Score: 9 - VMware Workstation (17.x) and VMware Fusion (13.x) contain a stack-based buffer-overflow vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine.
CVE-2023-20870
1 hour 51 minutes ago
Currently trending CVE - Hype Score: 9 - VMware Workstation and Fusion contain an out-of-bounds read vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine.
CVE-2023-34044
1 hour 51 minutes ago
Currently trending CVE - Hype Score: 9 - VMware Workstation( 17.x prior to 17.5) and Fusion(13.x prior to 13.5) contain an out-of-bounds
read vulnerability that exists in the functionality for sharing host
Bluetooth devices with the virtual machine. A malicious actor with local administrative privileges on a virtual ...
CVE-2025-38352
1 hour 51 minutes ago
Currently trending CVE - Hype Score: 1 - In the Linux kernel, the following vulnerability has been resolved:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
If an exiting non-autoreaping task has already passed exit_notify() and
calls handle_posix_cpu_timers() from IRQ, it can ...
CVE-2023-46604
1 hour 51 minutes ago
Currently trending CVE - Hype Score: 6 - The Java OpenWire protocol marshaller is vulnerable to Remote Code
Execution. This vulnerability may allow a remote attacker with network
access to either a Java-based OpenWire broker or client to run arbitrary
shell commands by manipulating serialized class types in the ...
CVE-2025-5959
1 hour 51 minutes ago
Currently trending CVE - Hype Score: 8 - Type Confusion in V8 in Google Chrome prior to 137.0.7151.103 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Kill
2 hours 20 minutes ago
You must login to view this content
cohenido
第四届阿里CTF官方writeup
3 hours 5 minutes ago
第四届阿里CTF官方writeup
CVE-2026-25049:n8n表达式解构赋值沙箱逃逸后端调用链深度解析
3 hours 5 minutes ago
漏洞描述N8N 是一个开源的工作流程自动化平台。在1.123.17和2.5.2版本之前,拥有创建或修改工作流权限的认证用户可以滥用工作流参数中的精心设计表达式,在运行n8n的主机上触发非预期的系统命令执行。这个问题已在1.123.17和2.5.2版本中得到修补漏洞影响评分:9.4版本:< 1.123.17; 2.x系列版本 < 2.5.2漏洞分析恶意请求构造后端触发链创建我们的恶意工作
浅析Python中的“斜体字符”绕过
3 hours 5 minutes ago
本文介绍了Python中利用Unicode“斜体字符”(如数学字母符号)绕过安全检测的原理:这些字符虽视觉相似但编码不同,而Python在解析标识符时会隐式进行NFKC/NFKD规范化,将其等效为普通ASCII字符。若WAF未做相同处理,攻击者可用变体字符构造恶意代码(如prinᵗ(1))实现绕过。该方法适用于函数名、变量名和字符串内容,但不适用于关键字,且在不同环境(如Web框架、JSON解析)
Experts Warn Funding Cuts Strain World Cup Security Plans
3 hours 8 minutes ago
Officials Warn Funding Cuts, Fragmented Intelligence Sharing Slow Threat Response
State and local officials told lawmakers that funding cuts, fragmented intelligence pipelines and unresolved interoperability gaps are undermining cyber and critical infrastructure protections as the country prepares for the 2026 World Cup and a series of high-profile global events.
State and local officials told lawmakers that funding cuts, fragmented intelligence pipelines and unresolved interoperability gaps are undermining cyber and critical infrastructure protections as the country prepares for the 2026 World Cup and a series of high-profile global events.
European Capitals Balk at Proposed GDPR Change
3 hours 8 minutes ago
Council of the EU Rejects Redefinition of 'Personal Data'
A rejection by European Union member governments of proposal backed by the European Commission to make it easier to share data about individuals won cautious plaudits from Paul Nemitz, a key architect of Europe's General Data Protection Regulation.
A rejection by European Union member governments of proposal backed by the European Commission to make it easier to share data about individuals won cautious plaudits from Paul Nemitz, a key architect of Europe's General Data Protection Regulation.