Aggregator
CVE-2020-1481 | Microsoft Visual Studio Code ESLint Extension injection
CVE-2021-27081 | Microsoft Visual Studio Code ESLint Extension Remote Code Execution
CVE-2022-3896 | WP Affiliate Platform Plugin up to 6.3.9 on WordPress $_SERVER["REQUEST_URI"] cross site scripting
CVE-2022-3897 | WP Affiliate Platform Plugin up to 6.3.9 on WordPress cross site scripting
CVE-2022-3898 | WP Affiliate Platform Plugin up to 6.3.9 on WordPress affiliates_menu cross-site request forgery
CVE-2025-24365 | dani-garcia vaultwarden up to 1.32.x access control
CVE-2025-48151 | CM Map Locations Plugin up to 2.1.6 on WordPress cross site scripting
CVE-2025-48149 | Cook&Meal Plugin up to 1.2.3 on WordPress file inclusion
CVE-2025-48148 | StoreKeeper for WooCommerce Plugin up to 14.4.4 on WordPress unrestricted upload
CVE-2025-48154 | Multimedia Playlist Slider Addon for WPBakery Page Builder Plugin cross site scripting
CVE-2025-48152 | Rentsyst Plugin up to 2.0.100 on WordPress cross site scripting
CVE-2014-1906 | VideoWhisper Live Streaming Integration plugin up to 4.24 lb_status.php ct cross site scripting (Advisory 125454 / EDB-31986)
Submit #631697: mcp-cli 1.13.0 OS Command Injection [Accepted]
Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines
A critical security flaw in Lenovo’s AI chatbot “Lena” has been discovered that allows attackers to execute malicious scripts on corporate machines through simple prompt manipulation. The vulnerability, identified by cybersecurity researchers, exploits Cross-Site Scripting (XSS) weaknesses in the chatbot’s implementation, potentially exposing customer support systems and enabling unauthorized access to sensitive corporate data. Key […]
The post Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines appeared first on Cyber Security News.
Feds charge alleged administrator of ‘sophisticated’ Rapper Bot botnet
Why email security needs its EDR moment to move beyond prevention
澳大利亚纽卡斯尔大学和重庆大学 | 利用预训练的语言模型释放基于语义的日志解析的真正潜力
StackHawk empowers security teams to expand their API testing coverage
StackHawk releaseed LLM-Driven OpenAPI Specifications, a powerful new capability that creates API documentation directly from source code, empowering security teams to expand their API testing coverage without relying on developers. This automation delivers faster, more accurate vulnerability scanning while enabling security teams to take ownership of their testing initiatives. With this new capability, StackHawk analyzes source code repositories, extracts API details using homegrown LLMs, and produces accurate OpenAPI specifications automatically. These specs, which are critical … More →
The post StackHawk empowers security teams to expand their API testing coverage appeared first on Help Net Security.