Aggregator
CVE-2023-20599 | AMD EPYC 7002 Processors Crypto Co-Processor improper access control for register interface (EUVD-2023-24778)
CVE-2025-5395 | Automatic Plugin Plugin up to 3.115.0 on WordPress core.php unrestricted upload (EUVD-2025-18086)
CVE-2025-26412 | SIMCom SIM7600G Modem LE20B03SIM7600M21-A AT Command backdoor (EUVD-2025-18087)
CVE-2025-3302 | Xagio SEO Plugin up to 7.1.0.16 on WordPress HTTP_REFERER cross site scripting (EUVD-2025-18096)
CVE-2025-4573 | Mattermost up to 9.11.13/10.5.4/10.6.3/10.7.1 LDAP Search Filter link objectGUID ldap injection (EUVD-2025-18095)
CVE-2025-4128 | Mattermost up to 9.11.13/10.5.4 /api/v4/teams/{team_id} authorization (EUVD-2025-18094)
CVE-2025-32908 | GNOME libsoup HTTP/2 Server denial of service (EUVD-2025-10901 / Nessus ID 235644)
一个$1,337的漏洞
Space Bears
You must login to view this content
Salesforce Industry Cloud Hit by 20 Vulnerabilities Including 0days
ISCC破阵夺旗赛三阶段misc详解
Геолокации, ВИЧ-статусы и миллионы признаний — теперь это не секреты, а публичный архив
Infamous website 4chan to be investigated by UK communications regulator
十万奖金等你来战!第二届“隐语杯”数据挑战赛报名正式启动!
CoreDNS Vulnerability Allows Attackers to Exhaust Server Memory via Amplification Attack
A high-severity vulnerability (CVE-2025-47950) in CoreDNS’s DNS-over-QUIC (DoQ) implementation enables remote attackers to crash DNS servers through stream amplification attacks. Patched in v1.21.2, this flaw highlights risks in modern protocol adoption for cloud-native systems Goroutine Proliferation in DoQ Implementation The vulnerability stems from CoreDNS’s handling of QUIC streams in its server_quic.go component. For every incoming […]
The post CoreDNS Vulnerability Allows Attackers to Exhaust Server Memory via Amplification Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
DoD issues new marching orders on secure software and SBOMs
The push for software that is secure by design as well as for improved software supply chain security is gaining momentum with new marching orders from the U.S. Department of Defense (DoD) as it revamps how it tests, authorizes, and procures software.
The post DoD issues new marching orders on secure software and SBOMs appeared first on Security Boulevard.