Aggregator
Docker Desktop逃逸漏洞(CVE-2025-9074)分析报告
CVE-2025-9795 | xujeff tianti 天梯 up to 2.3 UploadController.java ajaxUploadFile upfile unrestricted upload (Issue 43 / EUVD-2025-26359)
Submit #641125: thinkgem https://github.com/thinkgem/jeesite5 <=v5.12.1 XSS [Accepted]
CVE-2025-9794 | Campcodes Computer Sales and Inventory System 1.0 pos_transac.php?action=add cash/firstname sql injection (EUVD-2025-26360)
Submit #641122: xujeff https://github.com/xujeff/tianti <=2.3 Dangerous type of file upload (CWE-434) [Accepted]
AI Agent祛魅之路
Galaxy Kylin: эта ОС умеет то, что не может Windows — безвозвратно стирает компромат
Submit #642559: Campcodes Computer Sales and Inventory System V1.0 SQL Injection [Duplicate]
Submit #641103: Campcodes Computer Sales and Inventory System V1.0 SQL Injection [Accepted]
Hackers Exploit Email Marketing Platforms to Deliver Hidden Malware
In recent months, Trustwave SpiderLabs—a LevelBlue company renowned for its threat intelligence and incident response services—has observed a marked uptick in phishing campaigns that leverage legitimate email marketing platforms to cloak malicious links. By hijacking established infrastructure and URL redirectors, attackers are evading traditional defenses and duping recipients into divulging sensitive information. To combat these […]
The post Hackers Exploit Email Marketing Platforms to Deliver Hidden Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Critical Next.js Flaw Lets Attackers Bypass Authorization Controls
A newly disclosed critical vulnerability in the Next.js framework, tracked as CVE-2025-29927, allows unauthenticated attackers to bypass middleware-based authorization checks by exploiting improper handling of the x-middleware-subrequest HTTP header. This flaw impacts all versions of Next.js that rely on this header to differentiate between internal subrequests and external traffic, risking exposure of protected routes and administrative interfaces. […]
The post Critical Next.js Flaw Lets Attackers Bypass Authorization Controls appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Amazon Disrupts Russian APT29 Watering Hole Targeting Microsoft Authentication
Top 10 Cybersecurity Companies in United States (2025 Ranking)
Cyberattacks in the United States aren’t slowing down. From billion-dollar ransomware hits to stealthy supply chain breaches, every month brings a new headline. And the cost is staggering. The average...
The post Top 10 Cybersecurity Companies in United States (2025 Ranking) appeared first on Strobes Security.
The post Top 10 Cybersecurity Companies in United States (2025 Ranking) appeared first on Security Boulevard.
【安全圈】YouTuber 协助破获 6500 万美元国际诈骗团伙,主要受害者为美国老年人
【安全圈】美荷联手查封 VerifTools 虚假身份黑市,运营者迅速换域名重生
【安全圈】马斯克证实:xAI 整个代码库被盗,前华人工程师承认不当行为并跳槽 OpenAI
【安全圈】重大安全漏洞曝光,WhatsApp与Apple紧急发布补丁
Desolator
You must login to view this content