Aggregator
CVE-2025-22602 | Discourse Video Placeholder cross site scripting (GHSA-jcjx-694p-c5m3)
CVE-2025-22601 | Discourse up to beta 3.4.0.beta3/tests-passed 3.4.0.beta3 Link path traversal (GHSA-gvpp-v7mp-wxxw)
CVE-2024-56328 | Discourse Onebox cross site scripting (GHSA-j855-mhxj-x6vg)
CVE-2024-56197 | Discourse Metadata information disclosure (GHSA-xmgr-g9cp-v239)
CVE-2024-53851 | Discourse Setting resource consumption (GHSA-49rv-574x-wgpc)
CVE-2024-8125 | OpenText Content Management Extended ECM up to 24.4 WebReports Module improper validation of specified type of input (KB0834058)
CVE-2024-40700 | IBM Security Verify Access Appliance up to 10.0.8 cross site scripting
CVE-2024-35138 | IBM Security Verify Access Appliance up to 10.0.8 cross-site request forgery
CVE-2024-45658 | IBM Security Verify Access Appliance up to 10.0.8 information exposure
CVE-2024-43187 | IBM Security Verify Access Appliance up to 10.0.8 cleartext transmission
CVE-2024-13723 | Checkmk NagVis up to 1.9.41/2.3.0p9 unrestricted upload
FreeBuf早报 | DeepSeek本地化部署是否安全?新的Tiny FUD正针对macOS用户
美蒙合作新动向:我方如何应对这场地缘政治“大戏”?
情报高手秘籍:从数据搬运到决策预判的进阶之路
CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25
CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers
The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a new set of guidelines to fortify firewalls, routers, internet-facing servers, and other edge devices against cyber threats. This collaborative guidance, supported by leading international cybersecurity organizations, aims to address vulnerabilities in hardware that form the backbone of critical infrastructure and operational networks worldwide. Edge devices—like […]
The post CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
OpenNHP: Cryptography-driven zero trust protocol
OpenNHP is the open-source implementation of NHP (Network-resource Hiding Protocol), a cryptography-based zero trust protocol for safeguarding servers and data. OpenNHP offers the following benefits: Reduces attack surface by hiding infrastructure Prevents unauthorized network reconnaissance Mitigates vulnerability exploitation Stops phishing via encrypted DNS Protects against DDoS attacks Enables fine-grained access control Provides identity-based connection tracking Attack attribution “The OpenNHP proposed a cost-effective way to solve the vulnerability problem. The common way to mitigate vulnerabilities is … More →
The post OpenNHP: Cryptography-driven zero trust protocol appeared first on Help Net Security.