Aggregator
CVE-2026-26935 | Elastic Kibana up to 8.19.11/9.2.5/9.3.0 Internal Content Connectors Search Endpoint denial of service
CVE-2026-26937 | Elastic Kibana up to 8.19.10/9.2.4 Timelion resource consumption
CVE-2026-26938 | Elastic Kibana up to 9.3.0 Workflows special elements used in a template engine
CVE-2026-26936 | Elastic Kibana up to 8.19.10/9.2.4 redos
CVE-2026-23750 | Golioth Pouch up to 0.1.0 Server Certificate Parser server_cert_write heap-based overflow (1b2219a1)
CVE-2026-23749 | Golioth Firmware SDK up to 0.21.x blockwise_transfer_init null termination
CVE-2026-26934 | Elastic Kibana up to 8.19.11/9.2.5/9.3.0 improper validation of specified quantity in input
CVE-2026-23748 | Golioth Firmware SDK up to 0.21.x LightDB State String Parser memcpy payload_size integer underflow
CVE-2026-23747 | Golioth Firmware SDK up to 0.21.x Golioth_payload_as_int/Golioth_payload_as_float stack-based overflow
CVE-2025-50857 | ZenTaoPMS up to 18.11/21.6.beta File Upload /module/ai/control.php path traversal
CVE-2026-26932 | Elastic Packetbeat up to 8.19.10/9.2.4 PostgreSQL Protocol Parser array index
CVE-2026-26227 | VideoLAN VLC up to 3.6.x on Android Remote Access Server user_session excessive authentication
CVE-2026-3292 | jizhiCMS up to 2.5.6 Batch Interface frphp/lib/Model.php findAll data sql injection
Emulating the Systematic LokiLocker Ransomware
AttackIQ has released a new attack graph that emulates the behaviors of LokiLocker ransomware, a .NET based strain active since at least mid-August 2021. The malware combines defense evasion and impact techniques, including disabling Task Manager and Windows Firewall, as well as deleting Volume Shadow Copies to hinder detection and prevent restoration.
The post Emulating the Systematic LokiLocker Ransomware appeared first on AttackIQ.
The post Emulating the Systematic LokiLocker Ransomware appeared first on Security Boulevard.
Submit #760180: ACME Technology jizhiCMS <=2.5.6 SQL Injection [Accepted]
«Летающая тарелка» взлетела в центре Уханя за три секунды — и это не шоу. Как Китай превращает «низковысотную экономику» из лозунга в реальный рынок
ServiceNow security advisory (AV26-174)
The 2026 CISO Mandate: Proactive, Passwordless, and Context-Aware Identity Assurance
In our opinion, Gartner’s 2026 research reflects this broader evolution. Identity has expanded beyond perimeter controls and point-in-time authentication to encompass verification of the human, contextual risk assessment, and automated trust decisions.
The post The 2026 CISO Mandate: Proactive, Passwordless, and Context-Aware Identity Assurance appeared first on Security Boulevard.
Qilin
You must login to view this content