Aggregator
CVE-2024-45320 | Fujifilm DocuPrint CP225w Printer Job File out-of-bounds write
CVE-2025-1390 | OpenAnolis Anolis OS 2.73;0 Group Name pam_cap.so access control
CVE-2025-25224 | LuxSoft LuxCal Web Calendar dloader.php missing authentication
CVE-2025-25223 | LuxSoft LuxCal Web Calendar dloader.php path traversal
CVE-2025-25222 | LuxSoft LuxCal Web Calendar retrieve.php sql injection
CVE-2025-25221 | LuxSoft LuxCal Web Calendar pdf.php sql injection
DeepSeek本地化部署有风险!快来看看你中招了吗?
Juniper Issues Warning About Critical Authentication Bypass Vulnerability
Juniper Networks has issued an urgent security bulletin for its Session Smart Router, Session Smart Conductor, and WAN Assurance Router product lines, revealing a critical API authentication bypass vulnerability (CVE-2025-21589) that enables unauthenticated attackers to gain full administrative control over devices. The flaw carries maximum severity ratings of 9.8 under CVSS v3.1 and 9.3 under […]
The post Juniper Issues Warning About Critical Authentication Bypass Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-11433 | Surbma Plugin up to 2.0 on WordPress Shortcode sa-form cross site scripting
CVE-2024-11785 | hanthuy Integrate Firebase Plugin up to 0.9.3 on WordPress Shortcode firebase_show cross site scripting
CVE-2024-11781 | Smart Agenda Plugin up to 4.6 on WordPress Shortcode smartagenda cross site scripting
CVE-2024-11417 | dejureorg Vernetzungsfunktion Plugin up to 1.97.5 on WordPress Setting djo_einstellungen_menue cross-site request forgery
CVE-2024-11882 | bplugins FAQ and Answers Plugin up to 1.1.0 on WordPress Shortcode faq cross site scripting
DeepSeek崛起引发安全挑战,企业如何应对邮件数据泄露风险?
Fake Timesheet Report Emails Linked to Tycoon 2FA Phishing Kit
Cybersecurity researchers have uncovered a novel phishing campaign distributing the notorious Tycoon 2FA phishing kit through fraudulent timesheet notification emails, marking a concerning evolution in multi-layered credential theft operations. The operation utilizes Pinterest’s visual bookmarking service as an intermediary redirector, demonstrating attackers’ increasing sophistication in bypassing traditional email security filters. Campaign Mechanics and Delivery Vector […]
The post Fake Timesheet Report Emails Linked to Tycoon 2FA Phishing Kit appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The risks of autonomous AI in machine-to-machine interactions
In this Help Net Security, Oded Hareven, CEO of Akeyless Security, discusses how enterprises should adapt their cybersecurity strategies to address the growing need for machine-to-machine (M2M) security. According to Hareven, machine identities must be secured and governed similarly to human identities, focusing on automation and policy-as-code. How should enterprises reframe their cybersecurity strategies to account for machine-to-machine interactions? Enterprises need to recognize that machine-to-machine interactions have fundamentally different identity requirements than human-to-system interactions. Traditional … More →
The post The risks of autonomous AI in machine-to-machine interactions appeared first on Help Net Security.
CVE-2006-2022 | Ls3 Fenice 1.10 parse_url memory corruption (EDB-1717 / Nessus ID 21610)
Amazon Phish Hunts for Security Answers and Payment Information
Amazon Phish Hunts for Security Answers and Payment Information
The post Amazon Phish Hunts for Security Answers and Payment Information appeared first on Security Boulevard.