Aggregator
中东冲突爆发后,149 起黑客行动主义 DDoS 攻击波及 16 个国家 110 家机构
CVE-2026-28128 | ThemeREX Verse Plugin up to 1.7.0 on WordPress filename control (EUVD-2026-9780)
CVE-2026-28129 | axiomthemes Little Birdies Plugin up to 1.3.16 on WordPress filename control (EUVD-2026-9781)
CVE-2026-28134 | Crocoblock JetEngine Plugin up to 3.7.2 on WordPress code injection (EUVD-2026-9784)
CVE-2026-28133 | WP Chill Filr Plugin up to 1.2.12 on WordPress unrestricted upload (EUVD-2026-9783)
CVE-2026-28130 | AndonDesign UDesign Plugin up to 4.14.0 on WordPress cross site scripting (EUVD-2026-9782)
CVE-2026-2418 | Salesforce Login with Salesforce Plugin up to 1.0.2 on WordPress improper authentication (EUVD-2026-9599)
CVE-2026-28135 | WP Royal Royal Elementor Addons Plugin up to 1.7.1049 on WordPress inclusion of functionality from untrusted control sphere (EUVD-2026-9785)
CVE-2026-28137 | QuanticaLabs MediCenter Plugin up to 14.9 on WordPress cross site scripting (EUVD-2026-9786)
M365Pwned: Red Team tooling for Microsoft 365 exploitation via Microsoft Graph API
M365Pwned Red Team tooling for Microsoft 365 exploitation via Microsoft Graph API. Two WinForms GUI tools for enumerating,
The post M365Pwned: Red Team tooling for Microsoft 365 exploitation via Microsoft Graph API appeared first on Penetration Testing Tools.
Cisco Catalyst SD-WAN Vulnerabilities Allow Attackers to Gain Root Access
An urgent security advisory from Cisco warns that multiple vulnerabilities in Cisco Catalyst SD-WAN Manager could allow attackers to bypass authentication, gain root access, and overwrite critical files. Two of these vulnerabilities are already being exploited in the wild by hackers, making immediate remediation critical. The advisory details five vulnerabilities, led by CVE-2026-20129, a critical […]
The post Cisco Catalyst SD-WAN Vulnerabilities Allow Attackers to Gain Root Access appeared first on Cyber Security News.
CVE-2026-3459 | Drag and Drop Multiple File Upload Plugin up to 1.3.9.5 on WordPress dnd_upload_cf7_upload unrestricted upload
The Master Key: How Cyber-Kinetic Operations Decapitated the Iranian Leadership in “Operation Epic Fury”
The conflicts of the twenty-first century are increasingly inaugurated not by the roar of missiles, but by imperceptible
The post The Master Key: How Cyber-Kinetic Operations Decapitated the Iranian Leadership in “Operation Epic Fury” appeared first on Penetration Testing Tools.
CVE-2026-21786 | HCLSoftware Sametime up to 12.0.25 on iOS Application Log log file (KB0128949 / EUVD-2026-9797)
CVE-2026-28127 | e-plugins Lawyer Directory Plugin up to 1.3.2 on WordPress cross site scripting (EUVD-2026-9779)
CVE-2026-28130 | AndonDesign UDesign Plugin up to 4.14.0 on WordPress cross site scripting (EUVD-2026-9782)
CVE-2026-28537 | Huawei HarmonyOS 6.0.0 Window double free (EUVD-2026-9798)
CVE-2026-28137 | QuanticaLabs MediCenter Plugin up to 14.9 on WordPress cross site scripting (EUVD-2026-9786)
Under the Radar: How the SloppyLemming Syndicate Infiltrated South Asia’s Nuclear and Energy Sectors
Over the past year, South Asia has witnessed a marked proliferation of cyberespionage offensives targeting state apparatuses and
The post Under the Radar: How the SloppyLemming Syndicate Infiltrated South Asia’s Nuclear and Energy Sectors appeared first on Penetration Testing Tools.