Aggregator
CVE-2025-68778 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc1 btrfs_log_new_name reference count (Nessus ID 298404)
CVE-2025-68777 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc1 ti_am335x_tsc off-by-one (Nessus ID 298404)
CVE-2025-68776 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc1 prp_get_untagged_frame null pointer dereference (Nessus ID 298404)
CVE-2025-68773 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc1 spi buffer overflow (Nessus ID 298404)
利用360驱动阻断EDR网络连接
[Control systems] Siemens security advisory (AV26-106)
CVE-2023-45554 | ZZZCMS 2.1.9 imageext unrestricted upload (EUVD-2023-49846)
CVE-2023-45555 | ZZZCMS 2.1.9 zzz.php down_url unrestricted upload (EUVD-2023-49847)
CVE-2023-45556 | MyBB 1.8.33 Theme Management Theme Name cross site scripting (GHSA-4xqm-3cm2-5xgf / EUVD-2023-49848)
FortiSandbox XSS Vulnerability Let Attackers Run Arbitrary Commands
Fortinet has disclosed a high-severity cross-site scripting (XSS) vulnerability in its FortiSandbox platform, tracked as CVE-2025-52436 (FG-IR-25-093), that enables unauthenticated attackers to execute arbitrary commands on affected systems. Dubbed an “Improper Neutralization of Input During Web Page Generation” issue (CWE-79), the flaw resides in the graphical user interface (GUI) component and scores a 7.9. At […]
The post FortiSandbox XSS Vulnerability Let Attackers Run Arbitrary Commands appeared first on Cyber Security News.
Critical Pre-Auth RCE Vulnerability in BeyondTrust Remote Support & PRA Exposes Thousands of Instances (CVE-2026-1731)
Паспортный стол в Discord. Геймеров заставят подтверждать личность под угрозой ограничений
Volvo Group North America customer data exposed in Conduent hack
Microsoft rolls out new Secure Boot certificates before June expiration
Nitrogen
You must login to view this content
Take back control: A modern guide to mastering application control
Threat Hunting Is Critical to SOC Maturity but Often Misses Real Attacks
High-performing SOC teams are increasingly turning to sandbox-derived threat intelligence to make threat hunting repeatable and impactful. Tools like ANY.RUN’s TI Lookup enables faster hunts grounded in real attacker behaviours from millions of analyses. Threat hunting remains a cornerstone of mature Security Operations Centers (SOCs), aiming to detect stealthy adversaries before they cause damage. However, […]
The post Threat Hunting Is Critical to SOC Maturity but Often Misses Real Attacks appeared first on Cyber Security News.
FortiOS Authentication Bypass Vulnerability Lets Attackers Bypass LDAP Authentication
Fortinet has disclosed a high-severity authentication bypass vulnerability in FortiOS, tracked as CVE-2026-22153 (FG-IR-25-1052), that could allow unauthenticated attackers to sidestep LDAP authentication for Agentless VPN or Fortinet Single Sign-On (FSSO) policies. Classified under CWE-305 (Authentication Bypass by Primary Weakness), the flaw resides in the fnbamd daemon and requires specific LDAP server configurations enabling unauthenticated […]
The post FortiOS Authentication Bypass Vulnerability Lets Attackers Bypass LDAP Authentication appeared first on Cyber Security News.