Aggregator
CVE-2026-44581 | vercel next.js up to 15.5.15/16.2.4 cross site scripting (GHSA-ffhc-5mcf-pf4q / WID-SEC-2026-1401)
CVE-2026-44579 | vercel next.js up to 15.5.15/16.2.4 Cache Components Feature allocation of resources (GHSA-mg66-mrh9-m8jx / WID-SEC-2026-1401)
CVE-2026-44578 | vercel next.js up to 15.5.15/16.2.4 WebSocket server-side request forgery (GHSA-c4j6-fc7j-m34r / WID-SEC-2026-1401)
CVE-2026-44580 | vercel next.js up to 15.5.15/16.2.4 cross site scripting (GHSA-gx5p-jg67-6x7h / WID-SEC-2026-1401)
U.S. CISA adds a flaw in Cisco Catalyst SD-WAN to its Known Exploited Vulnerabilities catalog
Cisco security advisory (AV26-471)
New Malware Framework Enables Screen Control, Browser Artifact Access, and UAC Bypass
A newly uncovered malware framework is raising serious alarms across the cybersecurity community. Researchers have identified a previously unknown implant called TencShell, a sophisticated tool capable of giving attackers full remote control over a compromised system. The discovery highlights how threat actors are quietly repurposing publicly available offensive tools to carry out targeted intrusions with […]
The post New Malware Framework Enables Screen Control, Browser Artifact Access, and UAC Bypass appeared first on Cyber Security News.
CVE-2026-44193 | OPNsense up to 26.1.6 XMLRPC opnsense.restore_config_section argument injection (GHSA-xxp9-93cr-x54p / WID-SEC-2026-1344)
CVE-2026-0989 | libxml2 RelaxNG Parser recursion (Nessus ID 296249 / WID-SEC-2026-0126)
CVE-2026-0992 | libxml2 resource consumption (Nessus ID 296249 / WID-SEC-2026-0126)
CVE-2026-0990 | libxml2 XML Parser xmlCatalogXMLResolveURI recursion (Nessus ID 296249 / WID-SEC-2026-0126)
CVE-2026-44195 | OPNsense up to 26.1.6 Username lockout_handler excessive authentication (GHSA-h3vx-4q27-rc42 / WID-SEC-2026-1344)
ODNI taps officials to coordinate response to foreign election threats
Впервые в истории вооружённые четвероногие роботы пройдут боевые испытания в спецоперациях США
CVE-2026-6923 | Nuvoton NPCT7xx Elliptic Curve improper protection of physical side channels
node-ipc npm Package with 822K Weekly Downloads Compromised in Supply Chain Attack
A widely used JavaScript inter-process communication library has been weaponized again. Socket and Stepsecurity have confirmed that three newly published versions of node-ipc, a package with over 822,000 weekly downloads, contain obfuscated stealer and backdoor payloads, marking the second major supply chain compromise of this package since 2022. The affected versions are [email protected], [email protected], and […]
The post node-ipc npm Package with 822K Weekly Downloads Compromised in Supply Chain Attack appeared first on Cyber Security News.