Aggregator
CVE-2024-8099 | vanna-ai vanna read_csv/read_csv_auto/read_text/read_blob server-side request forgery
CVE-2024-12882 | comfyanonymous comfyui up to 0.2.4 download server-side request forgery
CVE-2024-12766 | parisneo lollms-webui 13 REST API /api/proxy forbid_remote_access server-side request forgery
CVE-2024-12759 | bentoml up to 1.3.9 HTTP Request resource consumption
CVE-2025-0330 | berriai litellm up to 1.52.1 Langfuse API Key proxy_server.py exposure of sensitive information through metadata
CVE-2025-0317 | ollama up to 0.3.14 GGUF Model File ggufPadding divide by zero
CVE-2025-0191 | gaizhenbiao ChuanhuChatGPT up to 20240914 resource consumption
CVE-2025-0189 | aimhubio aim up to 3.25.0 Websocket Message resource consumption
Закон о кибермошенничестве: классифайды могут избежать жестких требований
尼安德特人可能吃蛆虫
CISO survey: 6 lessons to boost third-party cyber-risk management
Third-party cybersecurity incidents are on the rise, but organizations face challenges in mitigating risks arising for the software supply chain, a survey of 200 chief information security officers (CISOs) has found.
The post CISO survey: 6 lessons to boost third-party cyber-risk management appeared first on Security Boulevard.
Is it time to retire 'one-off' pen tests for continuous testing?
Rooted Devices 250 Times More Vulnerable to Compromise
Cloudflare named a leader in Web Application Firewall Solutions in 2025 Forrester report
Are We Closing the Gender Gap in Cybersecurity?
Hackers Exploiting Multiple Cisco Smart Licensing Utility Vulnerabilities
Researchers have detected active exploitation attempts targeting two critical vulnerabilities in Cisco’s Smart Licensing Utility that were patched approximately six months ago. Threat actors leverage these flaws, which could potentially grant unauthorized access to sensitive licensing data and administrative functions. The attacks target two critical vulnerabilities in Cisco Smart Licensing Utility that were disclosed in […]
The post Hackers Exploiting Multiple Cisco Smart Licensing Utility Vulnerabilities appeared first on Cyber Security News.
IBM AIX Vulnerability Let Attackers Execute Arbitrary Commands
Critical security vulnerabilities in IBM AIX operating systems could allow unauthorized remote attackers to execute arbitrary commands, potentially compromising the entire system. IBM has released security patches to address these high-severity flaws affecting multiple Unix-based operating system versions. Security researchers have identified two serious vulnerabilities in IBM AIX systems that pose significant threats to enterprise environments. […]
The post IBM AIX Vulnerability Let Attackers Execute Arbitrary Commands appeared first on Cyber Security News.