Aggregator
System and information integrity
18 hours 59 minutes ago
Canadian Centre for Cyber Security
MCP-Kali-Server:基于MCP协议赋能大模型的Kali渗透测试工具集成方案
18 hours 59 minutes ago
kali mcp服务部署,利用claude调用mcp服务,实现自动化渗透
从4.8亿下载量的 LiteLLM投毒事件,看 AI 基础设施安全攻与防
19 hours ago
好的,我现在需要帮用户总结这篇文章的内容,控制在一百个字以内。首先,我得仔细阅读文章,抓住关键点。
文章讲的是LiteLLM这个工具被供应链投毒了,版本1.82.7和1.82.8被植入恶意代码。由于下载量大,影响范围广。攻击者通过入侵Trivy获取权限,发布恶意包。恶意代码会窃取敏感信息,并且利用.pth文件自动执行。卡帕西也评价这是恐怖的供应链攻击。
用户需要的是简短的总结,不需要特定的开头。我得把主要事件、影响和后果浓缩进去。
首先,事件: LiteLLM被投毒,版本有问题。影响:下载量大,波及范围广。攻击手法:入侵Trivy,窃取令牌发布恶意包。后果:窃取敏感信息,供应链攻击严重。
现在把这些点用简洁的语言表达出来,控制在100字以内。
可能的结构: LiteLLM遭受供应链攻击,恶意代码植入导致敏感信息泄露,影响广泛。
再优化一下:LiteLLM因供应链攻击植入恶意代码,导致大量用户敏感数据泄露,影响范围广泛。
这样大概在30字左右,符合要求。
知名大模型网关工具 LiteLLM 遭遇供应链攻击事件,其 1.82.7 和 1.82.8 版本被植入恶意代码。该事件波及范围极广,可能导致用户敏感信息泄露。
System and communications protection
19 hours 1 minute ago
Canadian Centre for Cyber Security
System and services acquisition
19 hours 2 minutes ago
Canadian Centre for Cyber Security
Risk assessment
19 hours 4 minutes ago
Canadian Centre for Cyber Security
Personal information handling and transparency
19 hours 5 minutes ago
Canadian Centre for Cyber Security
How SentinelOne’s AI EDR Autonomously Discovered and Stopped Anthropic’s Claude from Executing a Zero Day Supply Chain Attack, Globally
19 hours 7 minutes ago
Read our blog post to learn how SentinelOne’s AI EDR autonomously stopped a global LiteLLM supply chain attack before execution.
SentinelOne
WIndows x64 ShellCode开发 第一章 x64基础与简单x64程序
19 hours 8 minutes ago
本文为 Windows x64 ShellCode 开发系列第一章,讲解 x64 汇编基础与纯汇编实现ShellCode 编写流程。文章基于 NASM 汇编语法,从 TEB/PEB 遍历出发,手动定位 kernel32.dll 基址,解析 PE 导出表实现函数地址动态查询;适合 Windows 漏洞利用、ShellCode 开发学习。
Crypto industry may be running out of time to prepare for quantum attacks
19 hours 14 minutes ago
Google’s latest research suggests the cryptocurrency industry may have less time than expected to prepare for quantum computing. In a whitepaper, Google examines risks to elliptic curve cryptography, the system securing most blockchain networks. The researchers revisit earlier assumptions about how difficult it would be for a quantum computer to break these protections, concluding that the required resources may be lower than previously estimated. “To share this research responsibly, we engaged with the U.S. government … More →
The post Crypto industry may be running out of time to prepare for quantum attacks appeared first on Help Net Security.
Sinisa Markovic
【CVE-2026-28451】OpenClaw存在的SSRF 漏洞代码层面原理分析
19 hours 14 minutes ago
本文将结合关键代码,对 OpenClaw 低于 2026.2.14 版本中 Feishu 扩展存在的服务端请求伪造(SSRF)漏洞成因与官方修复方案进行简要分析,为相关开发者及安全从业人员提供参考。
CVE-2026-30284 | UXGROUP Voice Recorder 10.0 privilege escalation (ID 25 / EUVD-2026-17520)
19 hours 30 minutes ago
A vulnerability was found in UXGROUP Voice Recorder 10.0. It has been classified as critical. This issue affects some unknown processing. This manipulation causes privilege escalation.
This vulnerability is tracked as CVE-2026-30284. The attack is only possible within the local network. No exploit exists.
vuldb.com
CVE-2026-5087 | JJNAPIORK PAGI::Middleware::Session::Store::Cookie up to 0.001003 /dev/urandom rand weak prng (EUVD-2026-17531)
19 hours 30 minutes ago
A vulnerability was found in JJNAPIORK PAGI::Middleware::Session::Store::Cookie up to 0.001003. It has been rated as problematic. The affected element is the function rand of the file /dev/urandom. Performing a manipulation results in cryptographically weak prng.
This vulnerability is cataloged as CVE-2026-5087. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2026-24148 | NVIDIA Jetson Xavier/Jetson Orin insecure default initialization of resource (EUVD-2026-17510)
19 hours 30 minutes ago
A vulnerability classified as critical has been found in NVIDIA Jetson Xavier and Jetson Orin. This impacts an unknown function. This manipulation causes insecure default initialization of resource.
This vulnerability is handled as CVE-2026-24148. The attack can be initiated remotely. There is not any exploit available.
vuldb.com
CVE-2026-24153 | NVIDIA Jetson Xavier/Jetson Orin/Jetson Thor up to 38.2 on Linux nvluks trust boundary violation (EUVD-2026-17512)
19 hours 30 minutes ago
A vulnerability, which was classified as problematic, has been found in NVIDIA Jetson Xavier, Jetson Orin and Jetson Thor up to 38.2 on Linux. Affected by this vulnerability is an unknown functionality of the component nvluks. Performing a manipulation results in trust boundary violation.
This vulnerability was named CVE-2026-24153. The attack may be carried out on the physical device. There is no available exploit.
vuldb.com
CVE-2026-24154 | NVIDIA Jetson Xavier/Jetson Orin/Jetson Thor up to 38.2 on Linux Command Line os command injection (EUVD-2026-17514)
19 hours 30 minutes ago
A vulnerability classified as critical has been found in NVIDIA Jetson Xavier, Jetson Orin and Jetson Thor up to 38.2 on Linux. Affected by this issue is some unknown functionality of the component Command Line Handler. Performing a manipulation results in os command injection.
This vulnerability is known as CVE-2026-24154. The attack may be carried out on the physical device. No exploit is available.
vuldb.com
CVE-2026-24164 | NVIDIA BioNeMo Framework deserialization (EUVD-2026-17516)
19 hours 30 minutes ago
A vulnerability, which was classified as critical, was found in NVIDIA BioNeMo Framework. Affected by this issue is some unknown functionality. Executing a manipulation can lead to deserialization.
The identification of this vulnerability is CVE-2026-24164. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2026-24165 | NVIDIA BioNeMo Framework deserialization (EUVD-2026-17518)
19 hours 30 minutes ago
A vulnerability has been found in NVIDIA BioNeMo Framework and classified as problematic. This affects an unknown part. The manipulation leads to deserialization.
This vulnerability is referenced as CVE-2026-24165. The attack can only be performed from a local environment. No exploit is available.
vuldb.com
CVE-2026-5205 | chatwoot up to 4.11.2 Webhook API lib/webhooks/trigger.rb Webhooks::Trigger url server-side request forgery (EUVD-2026-17532)
19 hours 30 minutes ago
A vulnerability was found in chatwoot up to 4.11.2. It has been declared as critical. Affected by this vulnerability is the function Webhooks::Trigger in the library lib/webhooks/trigger.rb of the component Webhook API. Such manipulation of the argument url leads to server-side request forgery.
This vulnerability is uniquely identified as CVE-2026-5205. The attack can be launched remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com