Aggregator
微软强制执行重返办公室政策
微软强制执行重返办公室政策
CVE-2025-58447 | rAthena CA_SSO_LOGIN_REQ heap-based overflow (GHSA-4p33-6xqr-cm6x)
CVE-2025-59042 | PyInstaller up to 5.x code injection (GHSA-p2xp-xx3r-mffc)
Critical SAP NetWeaver Vulnerability Let Attackers Execute Arbitrary Code And Compromise System
A critical vulnerability CVE-2025-42922 has been discovered in SAP NetWeaver that allows an authenticated, low-privileged attacker to execute arbitrary code and achieve a full system compromise. The flaw resides in the Deploy Web Service upload mechanism, where insufficient access control validation permits the upload and execution of malicious files. This vulnerability poses a significant risk […]
The post Critical SAP NetWeaver Vulnerability Let Attackers Execute Arbitrary Code And Compromise System appeared first on Cyber Security News.
CVE-2025-59044 | himmelblau up to 0.9.22 himmelblau.conf insecure default initialization of resource (GHSA-2m43-mmg9-3rgc)
苹果将在明年推出搭载OLED显示屏的新款MacBook Pro 由三星提供面板
Beyond CVE: Crafting a Comprehensive Vulnerability Intelligence Strategy for Modern Security Teams
How I Found an Exposed User Database via an Unprotected API (And How to Prevent It) in a private…
How I Found an Exposed User Database via an Unprotected API (And How to Prevent It) in a private…
How i found first account takeover, reported and got the bounty in same day and in same hour.
How i found first account takeover, reported and got the bounty in same day and in same hour.
A very easy bug anyone can find and ignored by many bug bounty hunters
A very easy bug anyone can find and ignored by many bug bounty hunters
IDOR: How I Could Delete Any Product Image on an E-Commerce Platform
IDOR: How I Could Delete Any Product Image on an E-Commerce Platform
雷神众测漏洞周报2025.9.1-2025.9.7
雷神众测漏洞周报2025.9.1-2025.9.7
Deepfakes are rewriting the rules of geopolitics
Deception and media manipulation have always been part of warfare, but AI has taken them to a new level. Entrust reports that deepfakes were created every five minutes in 2024, while the European Parliament estimates that 8 million will circulate across the EU this year. Technologies are capable of destabilizing a country without a single shot being fired. Humans respond faster to bad news and are more likely to spread it. On top of that, … More →
The post Deepfakes are rewriting the rules of geopolitics appeared first on Help Net Security.