Aggregator
CVE-2025-37891 | Linux Kernel up to 6.6.89/6.12.27/6.14.5/6.15-rc4 ALSA do_convert_to_ump buffer overflow (EUVD-2025-15684 / Nessus ID 242283)
CVE-2025-37890 | Linux Kernel up to 6.15-rc4 net_sched use after free (Nessus ID 237223 / WID-SEC-2025-1098)
CVE-2026-22022 | Apache Solr up to 9.10.0 RuleBasedAuthorizationPlugin permission (WID-SEC-2026-0182)
Carlsberg Event Wristband Leaked PII, Researcher Told Not to Disclose
CVE-2026-1036 | 10Web Photo Gallery Plugin up to 1.8.36 on WordPress delete_comment authorization
CVE-2026-1220 | Google Chrome up to 144.0.7559.59 V8 race condition
CVE-2026-0663 | M-Files Server up to 25.12.15491.7 API Endpoint improper validation of syntactic correctness of input
CVE-2023-38954 | ZKTeco BioAccess IVS 3.3.1 sql injection (EUVD-2023-42714)
CVE-2023-38947 | WBCE CMS 1.6.1 /languages/install.php unrestricted upload (EUVD-2023-42707)
CVE-2023-38948 | jizhi CMS 1.9.5 Plugin /c/PluginsController.php file access (EUVD-2023-42708)
CVE-2023-38949 | ZKTeco BioTime 8.5.5 API password recovery (EUVD-2023-42709)
CVE-2023-38943 | ShuiZe_0x727 1.0 /iniFile/config.ini code injection (Issue 160 / EUVD-2023-42703)
CVE-2023-38942 | Dango-Translator 4.5.5 cloud_config.json command injection (Issue 127 / EUVD-2023-42702)
CVE-2023-38941 | django-sspanel 2022.2.2 sspanel/admin_view.py GoodsCreateView._post command injection (EUVD-2023-42701)
CVE-2023-38940 | Tenda F1203/FH1203/FH1205 form_fast_setting_wifi_set ssid stack-based overflow (EUVD-2023-42700)
CVE-2026-0902 | Google Chrome up to 143.0.7499.192 V8 function with inconsistent implementations (Nessus ID 284795 / WID-SEC-2026-0106)
Enterprise-Grade Identity Verification for AI-Enhanced Workflows
Enterprise-grade identity verification is critical for AI-driven businesses to prevent fraud, ensure compliance, and secure digital identities across onboarding, access control, and automated workflows.
The post Enterprise-Grade Identity Verification for AI-Enhanced Workflows appeared first on Security Boulevard.
96% баллов и ноль понимания, как сесть в автобус. Как нейросети сдали главный японский экзамен
CI/CD Under Attack: What the AWS CodeBuild “CodeBreach” Flaw Reveals About Modern Supply Chain Risk
A recent disclosure revealed a critical flaw in AWS CodeBuild that could allow attackers to abuse CI/CD pipelines and inject malicious code into trusted software builds by exploiting weaknesses in webhook validation, according to WebProNews. Rather than targeting production systems directly, the issue exposed how attackers can compromise software supply chains by manipulating trusted automation.
The post CI/CD Under Attack: What the AWS CodeBuild “CodeBreach” Flaw Reveals About Modern Supply Chain Risk appeared first on Seceon Inc.
The post CI/CD Under Attack: What the AWS CodeBuild “CodeBreach” Flaw Reveals About Modern Supply Chain Risk appeared first on Security Boulevard.