Aggregator
CVE-2022-29914 | Mozilla Firefox up to 99 Fullscreen (Bug 1746448 / Nessus ID 294768)
CVE-2022-29911 | Mozilla Firefox up to 99 iFrame sandbox (Bug 1761981 / Nessus ID 294768)
CVE-2022-29911 | Mozilla Thunderbird up to 91.8 iFrame sandbox (Bug 1761981 / Nessus ID 294768)
CVE-2022-29909 | Mozilla Thunderbird up to 91.8 Document cross-domain policy (Bug 1755081 / Nessus ID 294768)
CVE-2025-59870 | HCL MyXalytics up to 6.7 JWT Signing Secret nonce re-use (KB0128115)
«Кожаные» больше не нужны (даже в киберкриминале). Встречайте VoidLink – вирус, который нейросеть написала по ГОСТу
RansomHub claims alleged breach of Apple partner Luxshare
Chinese electronic manufacturer and Apple partner Luxshare Precision Industry has allegedly been breached by affiliates of the RansomHub ransomware-as-a-service outfit. Luxshare is one of the primary assemblers of Apple’s wireless earbuds, iPhones, and Vision Pro devices, as well as a producer of components used in Apple devices. The company also counts NVIDIA, Qualcomm, Samsung, Intel, and other high-profile tech and automotive companies among
The post RansomHub claims alleged breach of Apple partner Luxshare appeared first on Help Net Security.
Tesla hacked, 37 zero-days demoed at Pwn2Own Automotive 2026
CVE-2026-21926 | Oracle Siebel CRM Deployment up to 25.2 Server Infrastructure denial of service (EUVD-2026-3583)
CVE-2026-21927 | Oracle Solaris 11 Driver improper authorization (EUVD-2026-3582 / WID-SEC-2026-0174)
CVE-2026-21930 | Oracle ZFS Storage Appliance Kit 8.8 Fileystems improper authorization (EUVD-2026-3579 / WID-SEC-2026-0174)
CVE-2026-21928 | Oracle Solaris 11 Kernel information disclosure (EUVD-2026-3581 / WID-SEC-2026-0174)
EU Unveils Cybersecurity Overhaul with Proposed Update to Cybersecurity Act
关于Gophish:从二次开发到语义Fuzz的实战之路
CVE-2022-29909 | Mozilla Firefox up to 99 Document cross-domain policy (Bug 1755081 / Nessus ID 294768)
CVE-2020-1722 | Ipa up to 4.8.0 Password Hashing Long Password resource consumption (RHSA-2020:3936 / Nessus ID 294770)
CVE-2018-20677 | Bootstrap up to 3.3.x Affix Configuration cross site scripting (RHSA-2019:1456 / Nessus ID 294770)
−260°C, радиация и смертельный вакуум — курорт для пептидов? Найдено место, где жизнь зарождается вопреки здравому смыслу
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2026-20045 Cisco Unified Communications Products Code Injection Vulnerability
This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.