Aggregator
CVE-2025-23765 | W3speedster Plugin up to 7.33 on WordPress cross-site request forgery
CVE-2002-2425 | Sun Solaris Answerbook2 up to 1.4.2 Administrative Script AdminAddadmin access control (EDB-21677 / XFDB-9756)
Beelzebub: Open-source honeypot framework
Beelzebub is an open-source honeypot framework engineered to create a secure environment for detecting and analyzing cyber threats. It features a low-code design for seamless deployment and leverages AI to emulate the behavior of a high-interaction honeypot. “I created Beelzebub because my research activities require deploying numerous honeypots from different families (e.g., WordPress, Joomla, SSH, MySQL). With Beelzebub, configuring and managing this is streamlined through simple YAML files, enabling rapid setup and scalability,” Mario Candela, … More →
The post Beelzebub: Open-source honeypot framework appeared first on Help Net Security.
CVE-2020-25540 | ThinkAdmin V6 GET Request path traversal (EDB-48812)
9 - CVE-2024-40890
8 - CVE-2025-23114
CVE-2025-23828 | OriginalTips WordPress Data Guard Plugin up to 8 on WordPress cross site scripting
CVE-2025-23842 | Nilesh Shiragave Gallery Plugin up to 1.4 on WordPress cross-site request forgery
CVE-2018-11784 | Oracle MICROS Retail XBRi Loss Prevention 10.8.0/10.8.1/10.8.2/10.8.3 Apache Tomcat redirect (EDB-50118 / Nessus ID 118036)
CVE-2025-23871 | Bas Matthee LSD Google Maps Embedder Plugin up to 1.1 on WordPress cross-site request forgery
CVE-2025-23856 | Alessandro Staniscia Simple Vertical Timeline Plugin up to 0.1 on WordPress cross site scripting
CVE-2025-23919 | Ella van Durpe Slides & Presentations Plugin up to 0.0.39 on WordPress cross site scripting
CVE-2025-23928 | Aleksandar Arsovski Google Org Chart Plugin up to 1.0.1 on WordPress cross site scripting
CVE-2025-23807 | Jimmy Hu Spiderpowa Embed PDF Plugin up to 1.0 on WordPress cross site scripting
CVE-2025-23805 | SEOReseller Partner Plugin up to 1.3.15 on WordPress cross-site request forgery
CVE-2012-4036 | PBBoard 2.1.4 File Upload admin.php unrestricted upload (EDB-37616 / XFDB-77508)
大语言模型应用开发框架 —— Eino 正式开源!
底线
Evolving uses of tokenization to protect data
Tokenization replaces sensitive data, such as credit card numbers or personal identifiers, with unique, non-sensitive tokens with no exploitable value. This method helps protect sensitive information by ensuring that the actual data is never stored or transmitted, reducing the risk of breaches. Unlike encryption, which can be reversed with a key, tokenized data is only meaningful within a secure system that maps tokens back to the original values. In this Help Net Security video, Ruston … More →
The post Evolving uses of tokenization to protect data appeared first on Help Net Security.