Aggregator
CVE-2025-52688 | Alcatel-Lucent OmniAccess Stellar command injection
CVE-2025-52687 | Alcatel Lucent OmniAccess Stellar cross site scripting (EUVD-2025-21577)
CVE-2025-6977 | ProfileGrid Plugin up to 5.9.5.4 on WordPress pm_get_messenger_notification cross site scripting (EUVD-2025-21573)
CVE-2025-2799 | WP Event Manager Plugin up to 3.1.49 on WordPress cross site scripting
Senate panel passes Intelligence Authorization Act that takes aim at telecom hacks
CVE-2012-4864 | Oreans WinLicense 2.1.8.0 code injection (EDB-18637 / XFDB-74170)
Oracle security advisory – July 2025 quarterly rollup (AV25-425)
UnitedHealth-Linked Health Tech Firm Episource Breach Hits 5.4M Patients
CVE-2024-50291 | Linux Kernel up to 6.11.7 dvb-core dvb_vb2_expbuf buffer overflow (721c37af0355/fa88dc7db176 / Nessus ID 216493)
CVE-2024-50286 | Linux Kernel up to 6.1.116/6.6.60/6.11.7 ksmbd_smb2_session_create use after free (Nessus ID 211777 / WID-SEC-2024-3497)
CVE-2024-50285 | Linux Kernel up to 6.6.60/6.11.7 ksmbd race condition (1f993777275c/e257ac6fe138/0a77d947f599 / Nessus ID 216493)
CVE-2024-50282 | Linux Kernel up to 6.11.7 AMD GPU amdgpu_debugfs_gprwave_read buffer overflow (Nessus ID 211777 / WID-SEC-2024-3497)
CVE-2024-50283 | Linux Kernel up to 6.1.116/6.6.60/6.11.7 ksmbd smb3_preauth_hash_rsp use after free (Nessus ID 211777 / WID-SEC-2024-3497)
Update Google Chrome to fix actively exploited zero-day (CVE-2025-6558)
For the fifth time this year, Google has patched a Chrome zero-day vulnerability (CVE-2025-6558) exploited by attackers in the wild. About CVE-2025-6558 CVE-2025-6558 is a high-severity vulnerability that stems from incorrect validation of untrusted input in ANGLE – the Almost Native Graphics Layer Engine used by the browser – and GPU, Chrome’s Graphics Processing Unit that accelerates rendering tasks. Reported on June 23 by Google Threat Analysis Group researchers Clément Lecigne and Vlad Stolyarov, CVE-2025-6558 … More →
The post Update Google Chrome to fix actively exploited zero-day (CVE-2025-6558) appeared first on Help Net Security.
浙江大学 | HoneyJudge:一种基于设备内存测试的 PLC 蜜罐识别框架
Google’s AI Tool Big Sleep Uncovered Critical SQLite 0-Day Vulnerability and Blocks Active Exploitation
Google’s revolutionary AI-powered security tool, Big Sleep, has achieved a groundbreaking milestone by discovering and preventing the exploitation of a critical SQLite 0-day vulnerability, marking the first time an artificial intelligence agent has directly thwarted active cyber threats in the wild. The discovery of CVE-2025-6965, a severe security flaw that was known only to threat […]
The post Google’s AI Tool Big Sleep Uncovered Critical SQLite 0-Day Vulnerability and Blocks Active Exploitation appeared first on Cyber Security News.
Дарвин vs Библия: 100 лет споров, и Америка всё ещё боится эволюции как ереси
curl 8.15.0 Released With 233 Bugfixes and 334 Commits – Update Now
The curl development team has announced the release of curl 8.15.0 on July 16, 2025, marking the 269th release of the popular command-line tool and libcurl library. This update brings 233 documented bugfixes and represents 334 commits from the development community, showcasing continued active maintenance of the critical networking tool used by millions of developers […]
The post curl 8.15.0 Released With 233 Bugfixes and 334 Commits – Update Now appeared first on Cyber Security News.
Gmail Message Used to Trigger Code Execution in Claude and Bypass Protections
AI assistant systems were successfully exploited by using a crafted Gmail message to trigger code execution through Claude Desktop while bypassing built-in security protections. The attack exploits the Model Context Protocol (MCP) ecosystem, where individual components remain secure in isolation but create dangerous attack surfaces when combined. Key Takeaways1. Attack succeeded by chaining secure components […]
The post Gmail Message Used to Trigger Code Execution in Claude and Bypass Protections appeared first on Cyber Security News.