Aggregator
Охота на мастер-ключ: новый стилер VoidStealer ловит пароли Chrome в тот краткий миг, когда защита «расслабляется»
1 month ago
Инфостилеры научились обходить шифрование v20_master_key, подсматривая в память браузера.
India needs a shared, open-source malicious link detection API — and we need it yesterday
1 month ago
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要观点。
文章开头提到2024年印度因网络诈骗损失了22845亿卢比,比前一年增加了206%。这说明问题非常严重。接着,作者赞扬了CERT-In等团队的努力,并指出问题不是因为他们的不尽力,而是现有的结构无法应对问题。
然后,文章描述了恶意链接在不同平台上传播的情况,比如WhatsApp、Instagram和X(推特)等,导致普通用户如祖母点击后损失积蓄。这表明问题的实际影响很大。
作者分析了根本原因:各个平台各自运行检测系统,不共享情报,导致恶意链接在不同平台之间传播延迟。再加上AI生成的钓鱼链接难以辨别,情况更加恶化。
解决方案是建立一个开源的恶意链接检测API,由CERT-In、Meta、Google、X等共同维护,实现统一的威胁情报层和实时响应。作者认为现有的机构框架存在,但缺乏技术标准。
最后,作者呼吁开发者和政策制定者合作,并询问是否有类似项目在进行中以及可能的障碍。
总结时需要涵盖关键点:网络诈骗损失增加、现有结构的问题、平台间缺乏合作、AI带来的挑战、提出的解决方案以及呼吁合作。控制在100字以内,直接描述内容。
印度2024年网络诈骗损失达2.28万亿卢比,同比增长206%。现有平台间检测系统孤立,情报不共享,导致恶意链接传播延迟。AI生成钓鱼链接加剧风险。建议建立开源统一检测API,由CERT-In等共同维护,实现实时同步响应,提升整体网络安全水平。
CVE-2026-22321 | Phoenix Contact FL SWITCH 2005 up to 3.52 Telnet/SSH stack-based overflow (VDE-2025-104 / EUVD-2026-12790)
1 month ago
A vulnerability, which was classified as critical, was found in Phoenix Contact FL SWITCH 2005, FL SWITCH 2008, FL SWITCH 2016, FL SWITCH 2105, FL SWITCH 2108, FL SWITCH 2116, FL SWITCH 2204-2TC-2SFX, FL SWITCH 2205, FL SWITCH 2206-2FX, FL SWITCH 2206-2FX SM, FL SWITCH 2206-2FX SM ST, FL SWITCH 2206-2FX ST, FL SWITCH 2206-2SFX, FL SWITCH 2206-2SFX PN, FL SWITCH 2206C-2FX, FL SWITCH 2207-FX, FL SWITCH 2207-FX SM, FL SWITCH 2208, FL SWITCH 2208 PN, FL SWITCH 2208C, FL SWITCH 2212-2TC-2SFX, FL SWITCH 2214-2FX, FL SWITCH 2214-2FX SM, FL SWITCH 2214-2SFX, FL SWITCH 2214-2SFX PN, FL SWITCH 2216, FL SWITCH 2216 PN, FL SWITCH 2304-2GC-2SFP, FL SWITCH 2306-2SFP, FL SWITCH 2306-2SFP PN, FL SWITCH 2308, FL SWITCH 2308 PN, FL SWITCH 2312-2GC-2SFP, FL SWITCH 2314-2SFP, FL SWITCH 2314-2SFP PN, FL SWITCH 2316, FL SWITCH 2316 PN, FL SWITCH 2404-2TC-2SFX, FL SWITCH 2406-2SFX, FL SWITCH 2406-2SFX PN, FL SWITCH 2408, FL SWITCH 2408 PN, FL SWITCH 2412-2TC-2SFX, FL SWITCH 2414-2SFX, FL SWITCH 2414-2SFX PN, FL SWITCH 2416, FL SWITCH 2416 PN, FL SWITCH 2504-2GC-2SFP, FL SWITCH 2506-2SFP, FL SWITCH 2506-2SFP PN, FL SWITCH 2508, FL SWITCH 2508 PN, FL SWITCH 2512-2GC-2SFP, FL SWITCH 2514-2SFP, FL SWITCH 2514-2SFP PN, FL SWITCH 2516, FL SWITCH 2516 PN, FL SWITCH 2608, FL SWITCH 2608 PN, FL SWITCH 2708, FL SWITCH 2708 PN, FL SWITCH 2303-8SP1, FL NAT 2008, FL NAT 2208, FL NAT 2304-2GC-2SFP, FL SWITCH 2008F, K1, FL SWITCH TSN 2316, FL SWITCH TSN 2312-2GC-2SFP, FL SWITCH TSN 2314-2SFP, FL SWITCH 5924-4GC, FL SWITCH 5916-8GC-4SFP+, FL SWITCH 5924SFP-4GC, FL SWITCH 5924-4SFP+ and FL SWITCH 5916SFP-8GC-4SFP+ up to 3.52. The affected element is an unknown function of the component Telnet/SSH. Such manipulation leads to stack-based buffer overflow.
This vulnerability is referenced as CVE-2026-22321. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
vuldb.com
CVE-2026-22319 | Phoenix Contact FL SWITCH 2005 up to 3.52 POST Parameter stack-based overflow (VDE-2025-104 / EUVD-2026-12788)
1 month ago
A vulnerability was found in Phoenix Contact FL SWITCH 2005, FL SWITCH 2008, FL SWITCH 2016, FL SWITCH 2105, FL SWITCH 2108, FL SWITCH 2116, FL SWITCH 2204-2TC-2SFX, FL SWITCH 2205, FL SWITCH 2206-2FX, FL SWITCH 2206-2FX SM, FL SWITCH 2206-2FX SM ST, FL SWITCH 2206-2FX ST, FL SWITCH 2206-2SFX, FL SWITCH 2206-2SFX PN, FL SWITCH 2206C-2FX, FL SWITCH 2207-FX, FL SWITCH 2207-FX SM, FL SWITCH 2208, FL SWITCH 2208 PN, FL SWITCH 2208C, FL SWITCH 2212-2TC-2SFX, FL SWITCH 2214-2FX, FL SWITCH 2214-2FX SM, FL SWITCH 2214-2SFX, FL SWITCH 2214-2SFX PN, FL SWITCH 2216, FL SWITCH 2216 PN, FL SWITCH 2304-2GC-2SFP, FL SWITCH 2306-2SFP, FL SWITCH 2306-2SFP PN, FL SWITCH 2308, FL SWITCH 2308 PN, FL SWITCH 2312-2GC-2SFP, FL SWITCH 2314-2SFP, FL SWITCH 2314-2SFP PN, FL SWITCH 2316, FL SWITCH 2316 PN, FL SWITCH 2404-2TC-2SFX, FL SWITCH 2406-2SFX, FL SWITCH 2406-2SFX PN, FL SWITCH 2408, FL SWITCH 2408 PN, FL SWITCH 2412-2TC-2SFX, FL SWITCH 2414-2SFX, FL SWITCH 2414-2SFX PN, FL SWITCH 2416, FL SWITCH 2416 PN, FL SWITCH 2504-2GC-2SFP, FL SWITCH 2506-2SFP, FL SWITCH 2506-2SFP PN, FL SWITCH 2508, FL SWITCH 2508 PN, FL SWITCH 2512-2GC-2SFP, FL SWITCH 2514-2SFP, FL SWITCH 2514-2SFP PN, FL SWITCH 2516, FL SWITCH 2516 PN, FL SWITCH 2608, FL SWITCH 2608 PN, FL SWITCH 2708, FL SWITCH 2708 PN, FL SWITCH 2303-8SP1, FL NAT 2008, FL NAT 2208, FL NAT 2304-2GC-2SFP, FL SWITCH 2008F, K1, FL SWITCH TSN 2316, FL SWITCH TSN 2312-2GC-2SFP, FL SWITCH TSN 2314-2SFP, FL SWITCH 5924-4GC, FL SWITCH 5916-8GC-4SFP+, FL SWITCH 5924SFP-4GC, FL SWITCH 5924-4SFP+ and FL SWITCH 5916SFP-8GC-4SFP+ up to 3.52. It has been classified as critical. This impacts an unknown function of the component POST Parameter Handler. The manipulation leads to stack-based buffer overflow.
This vulnerability is listed as CVE-2026-22319. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-22320 | Phoenix Contact FL SWITCH 2005 up to 3.52 Telnet/SSH stack-based overflow (VDE-2025-104 / EUVD-2026-12789)
1 month ago
A vulnerability was found in Phoenix Contact FL SWITCH 2005, FL SWITCH 2008, FL SWITCH 2016, FL SWITCH 2105, FL SWITCH 2108, FL SWITCH 2116, FL SWITCH 2204-2TC-2SFX, FL SWITCH 2205, FL SWITCH 2206-2FX, FL SWITCH 2206-2FX SM, FL SWITCH 2206-2FX SM ST, FL SWITCH 2206-2FX ST, FL SWITCH 2206-2SFX, FL SWITCH 2206-2SFX PN, FL SWITCH 2206C-2FX, FL SWITCH 2207-FX, FL SWITCH 2207-FX SM, FL SWITCH 2208, FL SWITCH 2208 PN, FL SWITCH 2208C, FL SWITCH 2212-2TC-2SFX, FL SWITCH 2214-2FX, FL SWITCH 2214-2FX SM, FL SWITCH 2214-2SFX, FL SWITCH 2214-2SFX PN, FL SWITCH 2216, FL SWITCH 2216 PN, FL SWITCH 2304-2GC-2SFP, FL SWITCH 2306-2SFP, FL SWITCH 2306-2SFP PN, FL SWITCH 2308, FL SWITCH 2308 PN, FL SWITCH 2312-2GC-2SFP, FL SWITCH 2314-2SFP, FL SWITCH 2314-2SFP PN, FL SWITCH 2316, FL SWITCH 2316 PN, FL SWITCH 2404-2TC-2SFX, FL SWITCH 2406-2SFX, FL SWITCH 2406-2SFX PN, FL SWITCH 2408, FL SWITCH 2408 PN, FL SWITCH 2412-2TC-2SFX, FL SWITCH 2414-2SFX, FL SWITCH 2414-2SFX PN, FL SWITCH 2416, FL SWITCH 2416 PN, FL SWITCH 2504-2GC-2SFP, FL SWITCH 2506-2SFP, FL SWITCH 2506-2SFP PN, FL SWITCH 2508, FL SWITCH 2508 PN, FL SWITCH 2512-2GC-2SFP, FL SWITCH 2514-2SFP, FL SWITCH 2514-2SFP PN, FL SWITCH 2516, FL SWITCH 2516 PN, FL SWITCH 2608, FL SWITCH 2608 PN, FL SWITCH 2708, FL SWITCH 2708 PN, FL SWITCH 2303-8SP1, FL NAT 2008, FL NAT 2208, FL NAT 2304-2GC-2SFP, FL SWITCH 2008F, K1, FL SWITCH TSN 2316, FL SWITCH TSN 2312-2GC-2SFP, FL SWITCH TSN 2314-2SFP, FL SWITCH 5924-4GC, FL SWITCH 5916-8GC-4SFP+, FL SWITCH 5924SFP-4GC, FL SWITCH 5924-4SFP+ and FL SWITCH 5916SFP-8GC-4SFP+ up to 3.52. It has been declared as critical. Affected is an unknown function of the component Telnet/SSH. The manipulation results in stack-based buffer overflow.
This vulnerability is cataloged as CVE-2026-22320. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2026-22729 | VMware Spring AI up to 1.0.3/1.1.2 AbstractFilterExpressionConverter injection (EUVD-2026-12795)
1 month ago
A vulnerability was found in VMware Spring AI up to 1.0.3/1.1.2. It has been rated as problematic. Affected by this vulnerability is an unknown functionality of the component AbstractFilterExpressionConverter. This manipulation causes injection.
This vulnerability is registered as CVE-2026-22729. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-22730 | VMware Spring AI up to 1.0.3/1.1.2 MariaDBFilterExpressionConverter sql injection (EUVD-2026-12797)
1 month ago
A vulnerability categorized as critical has been discovered in VMware Spring AI up to 1.0.3/1.1.2. Affected by this issue is some unknown functionality of the component MariaDBFilterExpressionConverter. Such manipulation leads to sql injection.
This vulnerability is documented as CVE-2026-22730. The attack can be executed remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-22323 | Phoenix Contact FL SWITCH 2005 up to 3.52 Link Aggregation Configuration Interface cross-site request forgery (VDE-2025-104 / EUVD-2026-12794)
1 month ago
A vulnerability identified as problematic has been detected in Phoenix Contact FL SWITCH 2005, FL SWITCH 2008, FL SWITCH 2016, FL SWITCH 2105, FL SWITCH 2108, FL SWITCH 2116, FL SWITCH 2204-2TC-2SFX, FL SWITCH 2205, FL SWITCH 2206-2FX, FL SWITCH 2206-2FX SM, FL SWITCH 2206-2FX SM ST, FL SWITCH 2206-2FX ST, FL SWITCH 2206-2SFX, FL SWITCH 2206-2SFX PN, FL SWITCH 2206C-2FX, FL SWITCH 2207-FX, FL SWITCH 2207-FX SM, FL SWITCH 2208, FL SWITCH 2208 PN, FL SWITCH 2208C, FL SWITCH 2212-2TC-2SFX, FL SWITCH 2214-2FX, FL SWITCH 2214-2FX SM, FL SWITCH 2214-2SFX, FL SWITCH 2214-2SFX PN, FL SWITCH 2216, FL SWITCH 2216 PN, FL SWITCH 2304-2GC-2SFP, FL SWITCH 2306-2SFP, FL SWITCH 2306-2SFP PN, FL SWITCH 2308, FL SWITCH 2308 PN, FL SWITCH 2312-2GC-2SFP, FL SWITCH 2314-2SFP, FL SWITCH 2314-2SFP PN, FL SWITCH 2316, FL SWITCH 2316 PN, FL SWITCH 2404-2TC-2SFX, FL SWITCH 2406-2SFX, FL SWITCH 2406-2SFX PN, FL SWITCH 2408, FL SWITCH 2408 PN, FL SWITCH 2412-2TC-2SFX, FL SWITCH 2414-2SFX, FL SWITCH 2414-2SFX PN, FL SWITCH 2416, FL SWITCH 2416 PN, FL SWITCH 2504-2GC-2SFP, FL SWITCH 2506-2SFP, FL SWITCH 2506-2SFP PN, FL SWITCH 2508, FL SWITCH 2508 PN, FL SWITCH 2512-2GC-2SFP, FL SWITCH 2514-2SFP, FL SWITCH 2514-2SFP PN, FL SWITCH 2516, FL SWITCH 2516 PN, FL SWITCH 2608, FL SWITCH 2608 PN, FL SWITCH 2708, FL SWITCH 2708 PN, FL SWITCH 2303-8SP1, FL NAT 2008, FL NAT 2208, FL NAT 2304-2GC-2SFP, FL SWITCH 2008F, K1, FL SWITCH TSN 2316, FL SWITCH TSN 2312-2GC-2SFP, FL SWITCH TSN 2314-2SFP, FL SWITCH 5924-4GC, FL SWITCH 5916-8GC-4SFP+, FL SWITCH 5924SFP-4GC, FL SWITCH 5924-4SFP+ and FL SWITCH 5916SFP-8GC-4SFP+ up to 3.52. This affects an unknown part of the component Link Aggregation Configuration Interface. Performing a manipulation results in cross-site request forgery.
This vulnerability is reported as CVE-2026-22323. The attack is possible to be carried out remotely. No exploit exists.
You should upgrade the affected component.
vuldb.com
CVE-2026-22322 | Phoenix Contact FL SWITCH 2005 up to 3.52 Link Aggregation Configuration Interface cross site scripting (VDE-2025-104 / EUVD-2026-12791)
1 month ago
A vulnerability described as problematic has been identified in Phoenix Contact FL SWITCH 2005, FL SWITCH 2008, FL SWITCH 2016, FL SWITCH 2105, FL SWITCH 2108, FL SWITCH 2116, FL SWITCH 2204-2TC-2SFX, FL SWITCH 2205, FL SWITCH 2206-2FX, FL SWITCH 2206-2FX SM, FL SWITCH 2206-2FX SM ST, FL SWITCH 2206-2FX ST, FL SWITCH 2206-2SFX, FL SWITCH 2206-2SFX PN, FL SWITCH 2206C-2FX, FL SWITCH 2207-FX, FL SWITCH 2207-FX SM, FL SWITCH 2208, FL SWITCH 2208 PN, FL SWITCH 2208C, FL SWITCH 2212-2TC-2SFX, FL SWITCH 2214-2FX, FL SWITCH 2214-2FX SM, FL SWITCH 2214-2SFX, FL SWITCH 2214-2SFX PN, FL SWITCH 2216, FL SWITCH 2216 PN, FL SWITCH 2304-2GC-2SFP, FL SWITCH 2306-2SFP, FL SWITCH 2306-2SFP PN, FL SWITCH 2308, FL SWITCH 2308 PN, FL SWITCH 2312-2GC-2SFP, FL SWITCH 2314-2SFP, FL SWITCH 2314-2SFP PN, FL SWITCH 2316, FL SWITCH 2316 PN, FL SWITCH 2404-2TC-2SFX, FL SWITCH 2406-2SFX, FL SWITCH 2406-2SFX PN, FL SWITCH 2408, FL SWITCH 2408 PN, FL SWITCH 2412-2TC-2SFX, FL SWITCH 2414-2SFX, FL SWITCH 2414-2SFX PN, FL SWITCH 2416, FL SWITCH 2416 PN, FL SWITCH 2504-2GC-2SFP, FL SWITCH 2506-2SFP, FL SWITCH 2506-2SFP PN, FL SWITCH 2508, FL SWITCH 2508 PN, FL SWITCH 2512-2GC-2SFP, FL SWITCH 2514-2SFP, FL SWITCH 2514-2SFP PN, FL SWITCH 2516, FL SWITCH 2516 PN, FL SWITCH 2608, FL SWITCH 2608 PN, FL SWITCH 2708, FL SWITCH 2708 PN, FL SWITCH 2303-8SP1, FL NAT 2008, FL NAT 2208, FL NAT 2304-2GC-2SFP, FL SWITCH 2008F, K1, FL SWITCH TSN 2316, FL SWITCH TSN 2312-2GC-2SFP, FL SWITCH TSN 2314-2SFP, FL SWITCH 5924-4GC, FL SWITCH 5916-8GC-4SFP+, FL SWITCH 5924SFP-4GC, FL SWITCH 5924-4SFP+ and FL SWITCH 5916SFP-8GC-4SFP+ up to 3.52. Impacted is an unknown function of the component Link Aggregation Configuration Interface. The manipulation results in cross site scripting.
This vulnerability is known as CVE-2026-22322. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-1217 | Yoast Duplicate Post Plugin up to 4.5 on WordPress Republish Feature clone_bulk_action_handler/republish_request authorization (EUVD-2026-12800)
1 month ago
A vulnerability has been found in Yoast Duplicate Post Plugin up to 4.5 on WordPress and classified as critical. Affected is the function clone_bulk_action_handler/republish_request of the component Republish Feature. The manipulation leads to missing authorization.
This vulnerability is referenced as CVE-2026-1217. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
vuldb.com
CVE-2026-32565 | WebberZone Contextual Related Posts Plugin up to 4.2.1 on WordPress authorization (EUVD-2026-12812)
1 month ago
A vulnerability was found in WebberZone Contextual Related Posts Plugin up to 4.2.1 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation results in missing authorization.
This vulnerability is identified as CVE-2026-32565. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2025-12518 | Bee Content Design Befree SDK up to 3.46.x Content Security Policy cross site scripting
1 month ago
A vulnerability, which was classified as problematic, has been found in Bee Content Design Befree SDK up to 3.46.x. Affected by this vulnerability is an unknown functionality of the component Content Security Policy Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-12518. The attack is possible to be carried out remotely. No exploit exists.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2025-71265 | Linux Kernel up to 6.19.5 ntfs3 run_unpack denial of service (EUVD-2025-208818 / Nessus ID 302907)
1 month ago
A vulnerability labeled as critical has been found in Linux Kernel up to 6.19.5. The affected element is the function run_unpack of the component ntfs3. The manipulation results in denial of service.
This vulnerability is reported as CVE-2025-71265. The attacker must have access to the local network to execute the attack. No exploit exists.
The affected component should be upgraded.
vuldb.com
高版本触发toString的几种方法
1 month ago
JDK17后的高版本触发toString整合
CVE-2025-71276 | Alinto SOGo up to 5.12.4 cross site scripting (EUVD-2025-208920)
1 month ago
A vulnerability has been found in Alinto SOGo up to 5.12.4 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-71276. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
vuldb.com
CVE-2026-33550 | Alinto SOGo up to 5.12.4 single-factor authentication (EUVD-2026-14269)
1 month ago
A vulnerability, which was classified as problematic, was found in Alinto SOGo up to 5.12.4. Affected by this vulnerability is an unknown functionality. Executing a manipulation can lead to use of single-factor authentication.
This vulnerability is handled as CVE-2026-33550. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
vuldb.com
CVE-2019-25589 | Emtec ZOC Terminal 7.23.4 Shell out-of-bounds write (Exploit 46857 / EUVD-2019-19920)
1 month ago
A vulnerability, which was classified as critical, has been found in Emtec ZOC Terminal 7.23.4. Affected is an unknown function. Performing a manipulation of the argument Shell results in out-of-bounds write.
This vulnerability is known as CVE-2019-25589. Attacking locally is a requirement. Furthermore, an exploit is available.
vuldb.com
CVE-2026-21962
1 month ago
Currently trending CVE - Hype Score: 8 - Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in product of Oracle Fusion Middleware (component: Weblogic Server Proxy Plug-in for Apache HTTP Server, Weblogic Server Proxy Plug-in for IIS). Supported versions that are affected are 12.2.1.4.0, ...
CVE-2025-31324
1 month ago
Currently trending CVE - Hype Score: 8 - SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, ...