Aggregator
CVE-2008-1511 | ooComments 1.0 PathToComment code injection (EDB-31469 / BID-28401)
CVE-2008-0815 | Com Mezun on Joomla ID sql injection (EDB-31162 / XFDB-40448)
CVE-2008-1134 | Omegasoft INterneSErvicesLosungen 7 improper authentication (EDB-31003 / XFDB-39575)
CVE-2008-7059 | Aled Owen One-News index.php sql injection (EDB-32293 / XFDB-44644)
CVE-2008-3058 | Octeth Oempro 3.5.5.1 index.php FormValue_SearchKeywords sql injection (EDB-32656 / Nessus ID 35041)
CVE-2025-20254 | Cisco ASA/Firepower Threat Defense IKEv2 memory leak (cisco-sa-asa-ftd-ios-dos-DOESHWHy / WID-SEC-2025-1838)
CVE-2025-20224 | Cisco ASA/Firepower Threat Defense IKEv2 memory leak (cisco-sa-asa-ftd-ios-dos-DOESHWHy / WID-SEC-2025-1838)
CVE-2025-20252 | Cisco ASA/Firepower Threat Defense IKEv2 memory leak (cisco-sa-asa-ftd-ios-dos-DOESHWHy / WID-SEC-2025-1838)
.NET 文件监控,实时记录捕获上传的 WebShell
.NET 安全攻防知识交流社区
.NET内网实战: 剖析 ACL & ACE 与 系统内置账户
New Elastic EDR 0-Day Vulnerability Allows Attackers to Bypass Detection, Execute Malware, and Cause BSOD
A newly discovered zero-day vulnerability in Elastic’s Endpoint Detection and Response (EDR) solution allows attackers to bypass security measures, execute malicious code, and trigger a BSOD system crash, according to the Ashes Cybersecurity research. The vulnerability resides in a core component of the security software, effectively turning the defensive tool into a weapon against the […]
The post New Elastic EDR 0-Day Vulnerability Allows Attackers to Bypass Detection, Execute Malware, and Cause BSOD appeared first on Cyber Security News.
【转载】网络犯罪打击治理实战研讨会议题征集正式启动!
【资料】死亡算法:AI如何助长以色列在加沙的大规模屠杀
CISA Releases Operational Technology Guide for Owners and Operators Across all Critical Infrastructure
CISA in collaboration with international partners, has released comprehensive guidance, titled “Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators,” to strengthen cybersecurity defenses across critical infrastructure sectors. The document emphasizes the critical importance of maintaining accurate operational technology (OT) asset inventories as malicious cyber actors increasingly target industrial control systems (ICS), supervisory […]
The post CISA Releases Operational Technology Guide for Owners and Operators Across all Critical Infrastructure appeared first on Cyber Security News.