Aggregator
CVE-2025-58176 | OpenAgentPlatform Dive up to 0.9.3 deeplink.ts code injection (GHSA-2r34-7pgx-vvrc)
CVE-2025-44017 | Gunosy up to 7.33.x JSON Web Token insertion of sensitive information into sent data
Submit #642824: Dive v0.9.3 Command Injection [Accepted]
中秋 | 通用第五期上线啦,瓜分超多奖励金!
中秋第四趴|补天众测来派送月饼啦!
Google доверяет OnlyFans больше, чем учёным. Порно-платформа диктует правила всему интернету
【已复现】用友U8Cloud 文件上传漏洞(QVD-2025-33710)安全风险通告
Unfortunately, the ICEBlock app is activism theater
HashiCorp Vault Vulnerability Allows Attackers to Crash Servers
A critical vulnerability in HashiCorp Vault—tracked as CVE-2025-6203 and HCSEC-2025-24—has been disclosed that allows malicious actors to submit specially crafted payloads capable of exhausting server resources and rendering Vault instances unresponsive. The flaw affects both Vault Community and Enterprise editions, spanning versions 1.15.0 through 1.20.2 (with select earlier patch versions), and was publicly disclosed on […]
The post HashiCorp Vault Vulnerability Allows Attackers to Crash Servers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Von der Leyen’s plane hit by suspected Russian GPS Jamming in Bulgaria, landed Safely
亚马逊基本上未参与 AI 人才争夺战
Pin hack
CVE-2012-1466 | NetMechanica NetDecision 4.5.1 information disclosure (EDB-18542 / XFDB-73531)
CVE-2012-5931 | Novell NetIQ 2.3.0/2.3.1 Privileged User Manager unifid.exe set_log_config path traversal (EDB-22737 / Nessus ID 63688)
CVE-2012-4958 | Novell File Reporter 1.0.2 NFRAgent.exe path traversal (VU#273371 / EDB-23323)
CVE-2012-4957 | Novell File Reporter 1.0.2 NFRAgent.exe path traversal (VU#273371 / EDB-23323)
CVE-2012-1464 | NetMechanica NetDecision 4.5.1 Installation information disclosure (EDB-18543 / Nessus ID 10297)
CVE-2012-5932 | Novell NetIQ 2.3.0/2.3.1 Privileged User Manager unifid.exe ldapagnt_eval Perl Code code injection (EDB-22738 / Nessus ID 63185)
Azure AD Vulnerability Leaks Credentials, Lets Attackers Deploy Malicious Apps
Exposing an ASP.NET Core appsettings.json file containing Azure Active Directory (Azure AD) credentials poses a critical attack vector, effectively handing adversaries the keys to an organization’s cloud environment. During a recent cybersecurity assessment by Resecurity’s HUNTER Team, researchers discovered that a publicly accessible appsettings.json file had exposed the ClientId and ClientSecret of an Azure AD application, […]
The post Azure AD Vulnerability Leaks Credentials, Lets Attackers Deploy Malicious Apps appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.