Aggregator
CVE-2026-24434 | Tenda AC7 up to 03.03.03.01_cn cross-site request forgery (EUVD-2026-5154)
CVE-2025-67186 | TOTOLINK A950RG 4.1.2cu.5204_B20210112 Firewall.so seturlFilterRules url buffer overflow
CVE-2025-67188 | TOTOLINK A950RG 4.1.2cu.5204_B20210112 ipv6.so radvdinterfacename stack-based overflow
CVE-2025-67187 | TOTOLINK A950RG 4.1.2cu.5204_B20210112 Firewall.so setIpQosRules Comment stack-based overflow
CVE-2025-71179 | Creativeitem Academy LMS 7.0 /academy/blogs cross site scripting (EDB-51654)
CVE-2026-2116 | itsourcecode Society Management System 1.0 /admin/edit_expenses.php expenses_id sql injection (CNNVD-202602-1246)
CVE-2026-2117 | itsourcecode Society Management System 1.0 /admin/edit_activity.php activity_id sql injection (CNNVD-202602-1245)
CVE-2026-2089 | SourceCodester Online Class Record System 1.0 controller.php ID sql injection (EUVD-2026-5724)
CVE-2026-2090 | SourceCodester Online Class Record System 1.0 search.php term sql injection (EUVD-2026-5723)
Trojanized 7-Zip downloads turn home computers into proxy nodes
A trojanized version of the popular 7-Zip software is quietly turning home computers into residential proxy nodes, Malwarebytes warns. Spurred by a Reddit post in which a user complained about getting infected with malware after downloading 7-Zip from 7zip[.]com instead of the legitimate 7-zip.org, Malwarebytes researchers looked into the matter and found that the malicious installer functions as 7-zip, but also silently drops additional payloads onto the system. Further analysis showed the malware’s primary role … More →
The post Trojanized 7-Zip downloads turn home computers into proxy nodes appeared first on Help Net Security.
Germany warns of state-linked phishing campaign targeting journalists, government officials
Armis Centrix brings unified, AI-driven application security to the SDLC
Armis has announced Armis Centrix for Application Security, which unifies application security across an organization’s software development lifecycle. The technology helps security teams secure code as a next-generation attack vector to fortify organizations’ defenses and protect against cyber threats. “To effectively manage risk, it’s essential to get to the root cause of the problem and weed it out,” said Nadir Izrael, CTO of Armis. “Code-based vulnerabilities are being embedded into organizational infrastructure, and AI-generated code … More →
The post Armis Centrix brings unified, AI-driven application security to the SDLC appeared first on Help Net Security.