Aggregator
Случайно оставили порт открытым? Поздравляем, теперь вы спонсируете чью-то криптоферму
10 months ago
Логов почти нет, а ущерб уже начинает напоминать дивиденды.
CVE-2025-4598
10 months ago
Currently trending CVE - Hype Score: 3 - A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, ...
CVE-2025-5054
10 months ago
Currently trending CVE - Hype Score: 3 - Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces.
When handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a ...
CVE-2025-5513 | quequnlong shiyi-blog up to 1.2.1 /dev-api/api/comment/add content cross site scripting
10 months ago
A vulnerability has been found in quequnlong shiyi-blog up to 1.2.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dev-api/api/comment/add. The manipulation of the argument content leads to cross site scripting.
This vulnerability is known as CVE-2025-5513. The attack can be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2025-5512 | quequnlong shiyi-blog up to 1.2.1 Administrator Backend verifyPassword improper authentication
10 months ago
A vulnerability, which was classified as critical, was found in quequnlong shiyi-blog up to 1.2.1. Affected is an unknown function of the file /api/sys/user/verifyPassword/ of the component Administrator Backend. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2025-5512. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2025-5511 | quequnlong shiyi-blog up to 1.2.1 photos improper authorization
10 months ago
A vulnerability, which was classified as critical, has been found in quequnlong shiyi-blog up to 1.2.1. This issue affects some unknown processing of the file /dev api/app/album/photos/. The manipulation leads to improper authorization.
The identification of this vulnerability is CVE-2025-5511. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2025-5510 | quequnlong shiyi-blog up to 1.2.1 optimize url server-side request forgery
10 months ago
A vulnerability classified as critical was found in quequnlong shiyi-blog up to 1.2.1. This vulnerability affects unknown code of the file /app/sys/article/optimize. The manipulation of the argument url leads to server-side request forgery.
This vulnerability was named CVE-2025-5510. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2025-5509 | quequnlong shiyi-blog up to 1.2.1 /api/file/upload file/source path traversal
10 months ago
A vulnerability classified as critical has been found in quequnlong shiyi-blog up to 1.2.1. This affects an unknown part of the file /api/file/upload. The manipulation of the argument file/source leads to path traversal.
This vulnerability is uniquely identified as CVE-2025-5509. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
How global collaboration is hitting cybercriminals where it hurts
10 months ago
In this Help Net Security interview, William Lyne, Deputy Director of UK’s National Crime Agency, discusses the cybercrime ecosystem and the threats it enables. He explains how cybercrime is becoming more accessible and fragmented. Lyne also talks about key trends, recent disruptions, and collaboration between law enforcement and the private sector. What are the most concerning trends you’re seeing in cybercriminal behaviour today? Cybercrime is a constantly evolving threat, which is supported and enabled by … More →
The post How global collaboration is hitting cybercriminals where it hurts appeared first on Help Net Security.
Mirko Zorz
Найден способ мгновенно стереть любой телефон Ulefone — без ведома владельца
10 months ago
Польские эксперты раскрыли критические дыры в популярных смартфонах.
安全动态回顾|国家计算机病毒应急处理中心检测发现63款违法违规移动应用 Apple Safari使用户面临BitM攻击
10 months ago
快速浏览!2025.6.26—6.1安全动态周回顾。
黑客在Cetus Protocol加密货币抢劫案中窃取了2.23亿美元
10 months ago
Cetus Protocol的总交易量为570亿美元(截至2025年5月),超过1500万个账户在平台上执行了1.44亿笔交易。
中国出现假装上班的新商业模式
10 months ago
中国各大城市出现了一种新的商业模式:向失业者收费,租用办公桌假装工作,以应对青年失业率上升带来的社会压力。假装上班公司招聘帖文案几乎是同一个模板:“如果你失业了,想瞒住家里人,可以来我这里假装上班。这边能提供工位,你可以在这里玩手机,我会定期巡视,让你有上班摸鱼的快感。我会假装给你布置工作,你可以用任何理由拒绝,并把方案摔在我的办公桌上。一天只需要××元,‘早10晚5’不用打卡,就算我求你加班,你也能头也不回地走掉。”这类公司收费 30—60 元/天,工作环境看起来和普通白领上班的公司无异,提供 Wi-Fi、饮用水、电脑、空调,有些还能包一顿午饭,如果是空间大一点的公司,“应聘者”甚至能加钱解锁在公司“加班通宵”的体验。根据国家统计局的数据,2025 年 3 月,16-24 岁青年的失业率为 16.5%,一季度城镇失业率为 5.3%。
Submit #584492: quequnlong shiyi-blog 1.2.1 Stored cross-site scripting [Accepted]
10 months ago
Submit #584492 / VDB-310927
uglory
Submit #584491: quequnlong shiyi-blog 1.2.1 Logical loopholes 2 [Accepted]
10 months ago
Submit #584491 / VDB-310926
uglory
Submit #584490: quequnlong shiyi-blog 1.2.1 Logical loopholes 1 [Accepted]
10 months ago
Submit #584490 / VDB-310925
uglory
Submit #584489: quequnlong shiyi-blog 1.2.1 SSRF [Accepted]
10 months ago
Submit #584489 / VDB-310924
uglory
Submit #584488: quequnlong shiyi-blog 1.2.1 File Path Traversal [Accepted]
10 months ago
Submit #584488 / VDB-310923
uglory
CVE-2025-5508 | TOTOLINK A3002RU 2.1.1-B20230720.1011 IP Port Filtering Page Comment cross site scripting
10 months ago
A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011. It has been rated as problematic. Affected by this issue is some unknown functionality of the component IP Port Filtering Page. The manipulation of the argument Comment leads to cross site scripting.
This vulnerability is handled as CVE-2025-5508. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com