Aggregator
CVE-2023-25266 | Docmosis Tornado up to 2.9.4 Office Directory Setting privilege escalation (EUVD-2023-29228)
CVE-2023-25267 | GFI Kerio Connect 9.4.1 Patch 1 2FASetup webmail/api/jsonrpc primaryEMailAddress stack-based overflow (EUVD-2023-29229)
CVE-2019-25155 | Cure53 DOMPurify up to 1.0.10 hooks-target-blank-demo.html reverse tabnabbing (EUVD-2023-2923)
CVE-2023-25264 | Docmosis Tornado up to 2.9.4 Request improper authentication (EUVD-2023-29226)
CVE-2023-25265 | Docmosis Tornado up to 2.9.4 path traversal (EUVD-2023-29227)
CVE-2023-25263 | Stimulsoft Designer 2023.1.4/2023.1.5 Stimulsoft.report.dll hard-coded key (EUVD-2023-29225)
CVE-2023-25262 | Stimulsoft Designer Web 2023.1.3 server-side request forgery (EUVD-2023-29224)
CISA Alerts on Active Exploitation of WSUS Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about active exploitation of a critical vulnerability affecting Windows Server Update Service (WSUS). The agency updated its alert on October 29, 2025, adding crucial information about identifying vulnerable systems and detecting potential threats. Critical Flaw in Windows Server Update Service Microsoft released an […]
The post CISA Alerts on Active Exploitation of WSUS Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Вслед за госкорпорациями, частный бизнес могут законодательно обязать к тотальному импортозамещению ПО
CVE-2025-12080
CVE-2025-40063 | Linux Kernel up to 6.17.2 crypto crypto_acomp_streams allocation of resources (Nessus ID 271892 / WID-SEC-2025-2431)
CVE-2025-40062 | Linux Kernel up to 6.1.155/6.6.111/6.12.52/6.17.2 crypto qm_diff_regs initialization (Nessus ID 271885 / WID-SEC-2025-2431)
CVE-2025-40058 | Linux Kernel up to 6.12.52/6.17.2 iommu ecap_slads state issue (Nessus ID 271916 / WID-SEC-2025-2431)
CVE-2025-40060 | Linux Kernel up to 5.15.194/6.1.155/6.6.111/6.12.52/6.17.2 TRBE Driver etm_setup_aux null pointer dereference (Nessus ID 271889 / WID-SEC-2025-2431)
CVE-2025-40059 | Linux Kernel up to 6.12.52/6.17.2 coresight devm_kzalloc return return value (Nessus ID 271886 / WID-SEC-2025-2431)
CVE-2025-40056 | Linux Kernel up to 6.1.155/6.6.111/6.12.52/6.17.2 vhost copy_to_iter return return value (Nessus ID 271918 / WID-SEC-2025-2431)
CVE-2025-40057 | Linux Kernel up to 6.12.52/6.17.2 ptp max_vclocks max privilege escalation (Nessus ID 271907 / WID-SEC-2025-2431)
Google объявил о принудительном переходе на защищённые соединения в Chrome
Email breaches are the silent killers of business growth
78% of organizations were hit by an email breach in the past 12 months, according to the Email Security Breach Report 2025 by Barracuda. Phishing, impersonation, and account takeover continue to drive incidents that often lead to ransomware and data loss. Breaches are widespread and interconnected Phishing and spear phishing were the most common breach types, followed by business email compromise and account takeover. These attacks often overlap. A single phishing email can expose credentials … More →
The post Email breaches are the silent killers of business growth appeared first on Help Net Security.