Aggregator
CVE-2019-17495 | Swagger UI up to 3.23.10 CSS JSON Data injection (WID-SEC-2026-0559)
CVE-2018-25031 | Swagger UI up to 4.1.2 URL information disclosure (Issue 4872 / WID-SEC-2026-0559)
CVE-2026-21721 | Grafana up to 11.6.8/12.0.7/12.1.4/12.2.2/12.3.0 Dashboard Permissions API permission (Nessus ID 297049 / WID-SEC-2026-0224)
CVE-2026-21720 | Grafana up to 11.6.8/12.0.7/12.1.4/12.2.2/12.3.0 Gravatar Image /avatar/:hash random values (Nessus ID 297198 / WID-SEC-2026-0224)
Hackers Attacking SonicWall Firewalls from 4,000+ unique IP Addresses to Exploit Vulnerabilities
A large-scale reconnaissance campaign is actively targeting SonicWall firewalls across the internet, with attackers using more than 4,000 unique IP addresses to map vulnerable devices before launching exploitation attempts. Between February 22 and February 25, 2026, threat actors generated 84,142 scanning sessions against SonicWall SonicOS infrastructure, originating from 4,305 distinct IP addresses across 20 autonomous […]
The post Hackers Attacking SonicWall Firewalls from 4,000+ unique IP Addresses to Exploit Vulnerabilities appeared first on Cyber Security News.
定弦定角几何最值之代数化
Anthropic confirms Claude is down in a worldwide outage
CVE-2025-68300 | Linux Kernel up to 6.12.60/6.17.10 lookup_mnt_ns reference count (Nessus ID 299777 / WID-SEC-2025-2868)
CVE-2025-71072 | Linux Kernel up to 6.12.63/6.18.2/6.19-rc1 simple_offset_rename information disclosure (Nessus ID 299777)
CVE-2025-68298 | Linux Kernel up to 6.12.60/6.17.10 btusb_mtk_claim_iso_intf null pointer dereference (Nessus ID 299777 / WID-SEC-2025-2868)
CVE-2025-68822 | Linux Kernel up to 6.12.63/6.18.2/6.19-rc1 alps_reconnect use after free (Nessus ID 299777)
CVE-2025-68810 | Linux Kernel up to 6.12.63/6.18.2/6.19-rc1 KVM use after free (Nessus ID 299777)
CVE-2025-71100 | Linux Kernel up to 6.12.63/6.18.3/6.19-rc3 wifi trx.c rtl92cu_tx_fill_desc tids[] array index (Nessus ID 299777)
CVE-2026-27628 | py-pdf pypdf up to 6.7.1 infinite loop (ID 3654 / EUVD-2026-8601)
Threat Attribution: Why Structure Beats Speculation And How Hawkeye Delivers Both
When a breach occurs, most security teams move fast on containment. Systems get isolated, backups get activated, and logs get […]
The post Threat Attribution: Why Structure Beats Speculation And How Hawkeye Delivers Both appeared first on HawkEye.