Aggregator
CVE-2020-7019 | Elasticsearch up to 6.8.11/7.8.x Field Level Security privilege context switching error (Nessus ID 261365)
CVE-2021-20281 | Moodle up to 3.5.16/3.8.7/3.9.4/3.10.1 Online Users Block information disclosure (Nessus ID 261366)
CVE-2019-7581 | libming up to 0.4.8 util/parser.c parseSWF_ACTIONRECORD SWF File memory corruption (Issue 173 / Nessus ID 261369)
CVE-2019-7582 | libming up to 0.4.8 util/read.c readBytes SWF File memory corruption (Issue 172 / Nessus ID 261370)
CVE-2019-14829 | Moodle up to 3.5.7/3.6.5/3.7.1 Activity Creation improper following of specification by caller (Nessus ID 261368)
CVE-2021-20333 | MongoDB up to 3.6.19/4.0.20/4.2.9 neutralization for logs (Nessus ID 261367)
CVE-2018-7226 | LinuxVNC/VNCommand up to 0.9.10 VNConsole.c vcSetXCutTextProc integer overflow (Nessus ID 261373)
CVE-2018-7874 | libming 0.4.8 util/decompile.c strlenext memory corruption (Bug 115 / Nessus ID 261372)
CVE-2018-20428 | libming 0.4.8 decompile.c strlenext null pointer dereference (Issue 161 / Nessus ID 261372)
CVE-2025-9375 | xmltodict 0.14.2 xml injection (EUVD-2025-26350 / Nessus ID 261376)
CVE-2018-14325 | MP4v2 2.0.0 MP4Atom Parser mp4atom.cpp integer underflow (FEDORA-2019-1030f4816a / Nessus ID 261378)
CVE-2018-14379 | MP4v2 2.0.0 mp4atom.cpp MP4Atom::factory MP4 File type conversion (FEDORA-2019-1030f4816a / Nessus ID 261377)
Observo AI, Real Time Data Pipelines, and the Future of the Autonomous SOC: Rethinking Security Data from the Ground Up
Сюрприз в окне «Выполнить» — один клик может стоить вам всех данных
DragonForce
You must login to view this content
Researchers Bypassed Web Application Firewall With JS Injection with Parameter Pollution
Cybersecurity researchers have demonstrated a sophisticated technique for bypassing Web Application Firewalls (WAFs) using JavaScript injection combined with HTTP parameter pollution, exposing critical vulnerabilities in modern web security infrastructure. The research, conducted during an autonomous penetration test, revealed how attackers can exploit parsing differences between WAF engines and web application frameworks to execute malicious code […]
The post Researchers Bypassed Web Application Firewall With JS Injection with Parameter Pollution appeared first on Cyber Security News.
Major Data Breach Targeting Israeli Bank
You must login to view this content
How to Secure Grants for Technology and Data Security Projects
Learn how to secure grants for technology and data security projects by aligning mission impact, funder priorities, and building strong project plans.
The post How to Secure Grants for Technology and Data Security Projects appeared first on Security Boulevard.
Hackers Exploit Amazon SES to Blast Over 50,000 Malicious Emails Daily
A sophisticated cyberattack campaign where threat actors exploited compromised AWS credentials to hijack Amazon’s Simple Email Service (SES), launching large-scale phishing operations capable of sending over 50,000 malicious emails daily. The Wiz Research team identified this alarming SES abuse campaign in May 2025, highlighting a concerning trend where cybercriminals are weaponizing legitimate cloud services to […]
The post Hackers Exploit Amazon SES to Blast Over 50,000 Malicious Emails Daily appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.