Aggregator
Secure Your Spot at RSAC 2026 Conference
1 month 1 week hence
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
1 month hence
原域名已变更且将在2024年彻底废弃,请访问 https://govuln.com/news/ 查看新的RSS订阅
1 hour 24 minutes ago
原域名已变更且将在2024年彻底废弃,请访问 https://govuln.com/news/ 查看新的RSS订阅
CVE-2026-20700
2 hours 8 minutes ago
Currently trending CVE - Hype Score: 6 - A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a ...
CVE-2025-15556
2 hours 8 minutes ago
Currently trending CVE - Hype Score: 14 - Notepad++ versions prior to 8.8.9, when using the WinGUp updater, contain an update integrity verification vulnerability where downloaded update metadata and installers are not cryptographically verified. An attacker able to intercept or redirect update traffic can cause the ...
CVE-2025-13154
2 hours 8 minutes ago
Currently trending CVE - Hype Score: 6 - An improper link following vulnerability was reported in the SmartPerformanceAddin for Lenovo Vantage that could allow an authenticated local user to perform an arbitrary file deletion with elevated privileges.
CVE-2024-27834
2 hours 8 minutes ago
Currently trending CVE - Hype Score: 10 - The issue was addressed with improved checks. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, Safari 17.5, watchOS 10.5, macOS Sonoma 14.5. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
CVE-2024-27564
2 hours 8 minutes ago
Currently trending CVE - Hype Score: 12 - pictureproxy.php in the dirk1983 mm1.ltd source code f9f4bbc allows SSRF via the url parameter. NOTE: the references section has an archived copy of pictureproxy.php from its original GitHub location, but the repository name might later change because it is misleading.
CVE-2025-41117
2 hours 8 minutes ago
Currently trending CVE - Hype Score: 16 - Stack traces in Grafana's Explore Traces view can be rendered as raw HTML, and thus inject malicious JavaScript in the browser. This would require malicious JavaScript to be entered into the stack trace field.
Only datasources with the Jaeger HTTP API appear to be affected; ...
CVE-2026-21722
2 hours 8 minutes ago
Currently trending CVE - Hype Score: 16 - Public dashboards with annotations enabled did not limit their annotation timerange to the locked timerange of the public dashboard. This means one could read the entire history of annotations visible on the specific dashboard, even those outside the locked timerange.
This did ...
CVE-2025-68947
2 hours 8 minutes ago
Currently trending CVE - Hype Score: 1 - NSecsoft 'NSecKrnl' is a Windows driver that allows a local, authenticated attacker to terminate processes owned by other users, including SYSTEM and Protected Processes by issuing crafted IOCTL requests to the driver.
CVE-2025-8088
2 hours 8 minutes ago
Currently trending CVE - Hype Score: 2 - A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček
...
CVE-2024-43468
2 hours 8 minutes ago
Currently trending CVE - Hype Score: 6 - Microsoft Configuration Manager Remote Code Execution Vulnerability
DragonForce
2 hours 11 minutes ago
You must login to view this content
cohenido
DragonForce
2 hours 12 minutes ago
You must login to view this content
cohenido
安全合规、智能高效,威努特助力智慧矿山安全建设
2 hours 26 minutes ago
护航矿山智能化高质量转型。
The Epstein Files Reveal Stunning Operational Security Fails
3 hours 25 minutes ago
Plaintext Emails Trigger Police Probes Into Potential Leaks of State Secrets
The volume of information contained in the "Epstein Files," bizarre pictures they paint and our inability to know what they don't document complicate attempts to understand what it all means. What is clear is the digital detritus that can be generated by just a single iPad-using Boomer.
The volume of information contained in the "Epstein Files," bizarre pictures they paint and our inability to know what they don't document complicate attempts to understand what it all means. What is clear is the digital detritus that can be generated by just a single iPad-using Boomer.
The New CIO Mandate: From IT Operator to Strategy Architect
3 hours 25 minutes ago
McKinsey Reveals How Top Performing Firms Are Redefining Tech Leadership
Before artificial intelligence dominated every technology conversation, the successful CIO focused on keeping business systems up and running while keeping costs in line. But in 2026, the picture is changing, according to McKinsey's Global Tech Agenda 2026.
Before artificial intelligence dominated every technology conversation, the successful CIO focused on keeping business systems up and running while keeping costs in line. But in 2026, the picture is changing, according to McKinsey's Global Tech Agenda 2026.
Privacy Audit Finds Utah Child Welfare, Health Data at Risk
3 hours 25 minutes ago
Review Finds Access Control, Incident Response Gaps for 2 DHHS Data Repositories
A lack of access controls, poor record request handling, weak incident response plans and other security deficiencies related to two critical data repositories are potentially putting millions of Utahans sensitive personal and health information at risk, said a state audit report.
A lack of access controls, poor record request handling, weak incident response plans and other security deficiencies related to two critical data repositories are potentially putting millions of Utahans sensitive personal and health information at risk, said a state audit report.