Aggregator
CVE-2025-49491 | ASR Falcon_Linux/Kestrel/Lapwing_Linux prior 1536 traffic_service.C denial of service (EUVD-2025-19610)
CVE-2025-49492 | ASR Falcon_Linux/Kestrel/Lapwing_Linux prior 1536 dev_api.C out-of-bounds write (EUVD-2025-19608)
CVE-2025-49490 | ASR Falcon_Linux/Kestrel/Lapwing_Linux prior 1536 router/sms/sms.c denial of service (EUVD-2025-19605)
CVE-2025-49489 | ASR Falcon_Linux/Kestrel/Lapwing_Linux prior 1536 con_mgr/dialer_task.C denial of service (EUVD-2025-19606)
CVE-2025-6932 | D-Link DCS-7517 up to 2.02.0 Qlync Password Generation /bin/httpd g_F_n_GenPassForQlync hard-coded password (EUVD-2025-19591)
CVE-2024-4403 | parisneo lollms-webui up to 9.6 restart_program cross-site request forgery
Clothoff 试图支配深度伪造色情
Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
Citrix has issued an urgent advisory warning customers of widespread authentication failures following recent updates to NetScaler builds 14.1.47.46 and 13.1.59.19. The updates, released as part of the company’s ongoing secure-by-design initiative, have inadvertently caused significant disruption to enterprise authentication systems across multiple organizations worldwide. The authentication failures manifest as broken login pages and complete […]
The post Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability appeared first on Cyber Security News.
CVE-2025-52969 | ClickHouse 25.7.1.557 Executable unprotected alternate channel (EUVD-2025-18907)
CVE-2025-52997 | filebrowser up to 2.34.0 excessive authentication (GHSA-cm2r-rg7r-p7gg)
CVE-2025-52995 | filebrowser up to 2.33.9 command injection (EUVD-2025-19580)
CVE-2025-49493 | Akamai CloudTest 58.30 xml external entity reference (EUVD-2025-19583)
CVE-2025-36593 | Dell OpenManage Network Integration up to 3.7 RADIUS Protocol authentication replay (dsa-2025-257 / EUVD-2025-19568)
CVE-2024-29850 | Veeam Backup & Replication 11.0.1.1261/11.0.1.1261 P20240304/12.0.0.1420 authentication replay
New Hpingbot Exploits Pastebin for Payload Delivery and Uses Hping3 for DDoS Attacks
NSFOCUS Fuying Lab’s Global Threat Hunting System has discovered a new botnet family called “hpingbot” that has been quickly expanding since June 2025, marking a significant shift in the cybersecurity scene. This cross-platform botnet, built from scratch using the Go programming language, targets both Windows and Linux/IoT environments and supports multiple processor architectures including amd64, […]
The post New Hpingbot Exploits Pastebin for Payload Delivery and Uses Hping3 for DDoS Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
深度解读美国政府的零日漏洞保留政策
CHAOS
You must login to view this content