Aggregator
Пришли в гости в прошлом году, а грабить начали только сейчас. Краткий гид по очень терпеливым хакерам
5 days 16 hours ago
Специалисты потянули за одну нитку и распутали клубок из десятков скрытных взломов.
Cybersecurity AI Awareness Training for Texas Government Agencies: How Kratikal’s Threatcop Meets the DIR Mandate
5 days 17 hours ago
The last few big cyberattacks on government organizations all have one thing in common. They started because of something a person did wrong, not because of technology. These cyberattacks occur when an employee clicks a link in an email or answers a strange phone call. Sometimes they even give away information by mistake. So technology […]
The post Cybersecurity AI Awareness Training for Texas Government Agencies: How Kratikal’s Threatcop Meets the DIR Mandate appeared first on Kratikal Blogs.
The post Cybersecurity AI Awareness Training for Texas Government Agencies: How Kratikal’s Threatcop Meets the DIR Mandate appeared first on Security Boulevard.
Shikha Dhingra
242 тысячи IP-адресов за неделю — и почти все пустышки. Как «призрачный флот» заставил админов понервничать зря
5 days 17 hours ago
Аналитики обнаружили пугающую закономерность в работе удалённых узлов.
Defenders share the top learnings from the 2026 Threat Detection Report
5 days 17 hours ago
Red Canary, a Zscaler company
CVE-2026-33429 | parse-community parse-server up to 8.6.53/9.6.0-alpha.42 information exposure (GHSA-qpc3-fg4j-8hgm)
5 days 18 hours ago
A vulnerability was found in parse-community parse-server up to 8.6.53/9.6.0-alpha.42 and classified as problematic. The impacted element is an unknown function. Such manipulation leads to information exposure through discrepancy.
This vulnerability is uniquely identified as CVE-2026-33429. The attack can be launched remotely. No exploit exists.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-23921 | Zabbix up to 7.0.21/7.2.14/7.4.5 CApiService.php sortfield sql injection (EUVD-2026-14955)
5 days 18 hours ago
A vulnerability was found in Zabbix up to 7.0.21/7.2.14/7.4.5. It has been classified as critical. This affects an unknown function of the file include/classes/api/CApiService.php. Performing a manipulation of the argument sortfield results in sql injection.
This vulnerability was named CVE-2026-23921. The attack may be initiated remotely. There is no available exploit.
vuldb.com
CVE-2026-23923 | Zabbix up to 7.4.6 Frontend validate externally-controlled input to select classes or code (EUVD-2026-14956)
5 days 18 hours ago
A vulnerability was found in Zabbix up to 7.4.6. It has been declared as problematic. This impacts the function validate of the component Frontend. Executing a manipulation can lead to use of externally-controlled input to select classes or code.
The identification of this vulnerability is CVE-2026-23923. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2026-2417 | Pharos Controls Mosaic Show Controller 2.15.3 missing authentication (icsa-26-083-01 / EUVD-2026-14960)
5 days 18 hours ago
A vulnerability, which was classified as critical, was found in Pharos Controls Mosaic Show Controller 2.15.3. This affects an unknown function. Such manipulation leads to missing authentication.
This vulnerability is traded as CVE-2026-2417. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2026-33323 | parse-community parse-server up to 8.6.50/9.6.0-alpha.39 Configuration Options response discrepancy (GHSA-h29g-q5c2-9h4f / EUVD-2026-14189)
5 days 18 hours ago
A vulnerability has been found in parse-community parse-server up to 8.6.50/9.6.0-alpha.39 and classified as problematic. This impacts an unknown function of the component Configuration Options Handler. Performing a manipulation results in observable response discrepancy.
This vulnerability is known as CVE-2026-33323. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
vuldb.com
CVE-2026-33409 | parse-community parse-server up to 8.6.51/9.6.0-alpha.40 improper authentication (GHSA-pfj7-wv7c-22pr)
5 days 18 hours ago
A vulnerability was found in parse-community parse-server up to 8.6.51/9.6.0-alpha.40 and classified as critical. Affected is an unknown function. Executing a manipulation can lead to improper authentication.
This vulnerability is handled as CVE-2026-33409. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-33417 | ellite Wallos up to 4.7.1 Password Reset Token session expiration (GHSA-p3fv-m43r-3fhf / EUVD-2026-14967)
5 days 18 hours ago
A vulnerability was found in ellite Wallos up to 4.7.1. It has been classified as problematic. Affected by this vulnerability is an unknown functionality of the component Password Reset Token Handler. The manipulation leads to session expiration.
This vulnerability is uniquely identified as CVE-2026-33417. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-33421 | parse-community parse-server up to 8.6.52/9.6.0-alpha.41 LiveQuery WebSocket Interface authorization (GHSA-fph2-r4qg-9576)
5 days 18 hours ago
A vulnerability was found in parse-community parse-server up to 8.6.52/9.6.0-alpha.41. It has been declared as problematic. Affected by this issue is some unknown functionality of the component LiveQuery WebSocket Interface. The manipulation results in incorrect authorization.
This vulnerability was named CVE-2026-33421. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2026-30932 | Froxlor up to 2.3.4 API Endpoint DomainZones.add injection (GHSA-x6w6-2xwp-3jh6)
5 days 18 hours ago
A vulnerability was found in Froxlor up to 2.3.4. It has been rated as problematic. This affects the function DomainZones.add of the component API Endpoint. This manipulation causes injection.
The identification of this vulnerability is CVE-2026-30932. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-23920 | Zabbix up to 7.0.21/7.2.14/7.4.5 Shell Command os command injection (EUVD-2026-14952)
5 days 18 hours ago
A vulnerability classified as critical was found in Zabbix up to 7.0.21/7.2.14/7.4.5. This impacts an unknown function of the component Shell Command Handler. Such manipulation leads to os command injection.
This vulnerability is documented as CVE-2026-23920. The attack can be executed remotely. There is not any exploit available.
vuldb.com
CVE-2026-29772 | withastro up to 9.x POST /_server-islands/ JSON.parse allocation of resources (GHSA-3rmj-9m5h-8fpv / EUVD-2026-14962)
5 days 18 hours ago
A vulnerability was found in withastro astro up to 9.x. It has been classified as problematic. This vulnerability affects the function JSON.parse of the file /_server-islands/ of the component POST Handler. This manipulation causes allocation of resources.
This vulnerability is handled as CVE-2026-29772. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-23924 | Zabbix Agent 2 Docker Plugin up to 6.0.43/7.0.22/7.4.6 Docker Archive API docker.container_info argument injection (EUVD-2026-14958)
5 days 18 hours ago
A vulnerability was found in Zabbix Agent 2 Docker Plugin up to 6.0.43/7.0.22/7.4.6. It has been declared as critical. This issue affects some unknown processing of the component Docker Archive API. Such manipulation of the argument docker.container_info leads to argument injection.
This vulnerability is uniquely identified as CVE-2026-23924. The attack can be launched remotely. No exploit exists.
vuldb.com
27 секунд на взлом и 4 минуты на захват сети. Рассказываем, как ИИ превратил хакерство в гонку на выживание
5 days 18 hours ago
Пока вы читали этот заголовок, хакер уже внутри вашей сети.
实时备份是个伪命题吗?
5 days 18 hours ago
为什么说实时备份是个伪命题?又为什么这种说法这么流行?什么场景适合实时备份?什么场景适合定时备份?
CVE-2022-50674 | Linux Kernel up to 5.19.16/6.0.2 riscv vfork_exec.c vdso_join_timens null pointer dereference (Nessus ID 278329 / WID-SEC-2025-2765)
5 days 19 hours ago
A vulnerability was found in Linux Kernel up to 5.19.16/6.0.2 and classified as critical. Affected by this issue is the function vdso_join_timens of the file tools/testing/selftests/timens/vfork_exec.c of the component riscv. Such manipulation leads to null pointer dereference.
This vulnerability is referenced as CVE-2022-50674. The attack needs to be initiated within the local network. No exploit is available.
It is suggested to upgrade the affected component.
vuldb.com