Aggregator
CVE-2025-68790 | Linux Kernel up to 6.18.2/6.19-rc1 HCA_PORTS mlx5_unload_one use after free (WID-SEC-2026-0086)
CVE-2025-68786 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2 ksmbd i_size privilege escalation (Nessus ID 298404 / WID-SEC-2026-0086)
CVE-2025-68788 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc1 fsnotify utimensat information disclosure (Nessus ID 298404 / WID-SEC-2026-0086)
CVE-2025-68787 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc1 netrom include/linux/kmemleak.h nr_sendmsg memory leak (Nessus ID 283665 / WID-SEC-2026-0086)
CVE-2025-68785 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc1 push_nsh out-of-bounds (Nessus ID 298404 / WID-SEC-2026-0086)
Reflecting on Your Tier Model: CVE-2025-33073 and the One-Hop Problem
Reflecting on Your Tier Model: CVE-2025-33073 and the One-Hop Problem
The False Sense of Security SMB signing on domain controllers has become standard practice across most Active Directory environments. But this hardening may have created a false sense of security. CVE-2025-33073 changes the calculus by removing the prerequisite of admin access, enabling NTLM relay attack Active Directory exploitation through unconstrained delegation. Domain controllers enforce SMB […]
The post Reflecting on Your Tier Model: CVE-2025-33073 and the One-Hop Problem appeared first on Praetorian.
The post Reflecting on Your Tier Model: CVE-2025-33073 and the One-Hop Problem appeared first on Security Boulevard.
OpenAI Codex推出插件/技能/MCP 后续也将支持自主发布插件和技能
维基百科禁止人工智能生成的文章
JVN: baserCMSにおける複数の脆弱性
JVN: WordPress用プラグインOpenStreetMapにおけるクロスサイトスクリプティングの脆弱性
罗技GPW鼠标商城发布侮辱性广告嘲讽用户是狗 罗技中国甩锅称是经销商干的
Apifox 供应链投毒安全事件预警与排查
PhaseLatch: Using a 1970’s Microprocessor Chip with a Modern 20 MSPS ADC
Anthropic起诉白宫迎阶段性胜利 禁令被叫停
奈飞宣布上调所有订阅层级价格 标准无广告订阅套餐涨价至19.99美元/月
AI Infrastructure LiteLLM Supply Chain Poisoning Alert
AI Infrastructure LiteLLM Supply Chain Poisoning Alert
Overview Recently, NSFOCUS Technology CERT detected that the GitHub community disclosed that there was a credential stealing program in the new version of LiteLLM. Analysis confirmed that it had suffered supply chain poisoning by the TeamPCP group on PyPI. It stole the publishing permission credentials by hacking into the security scanning tool Trivy used in […]
The post AI Infrastructure LiteLLM Supply Chain Poisoning Alert appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..
The post AI Infrastructure LiteLLM Supply Chain Poisoning Alert appeared first on Security Boulevard.