Aggregator
CVE-2023-24221 | LuckyframeWEB 3.5 /system/DeptMapper.xml dataScope sql injection (Issue 23 / EUVD-2023-28280)
CVE-2023-43961 | Dromara SaToken up to 1.3.50RC Spring dynamic Controller improper authentication (Issue 511 / EUVD-2023-2827)
CVE-2023-24212 | Tenda AX3 16.03.12.11 /goform/SetSysTimeCfg timeType stack-based overflow (EUVD-2023-28271)
CVE-2023-24217 | AgileBio Electronic Lab Notebook 4.234 file inclusion (ID 171252 / EUVD-2023-28276)
У вас ASUS роутер? Поздравляем, вы пользуетесь DDNS. И это теперь проблема
Radar
You must login to view this content
Windows 11 更新破坏了 Recovery Environment
Qilin
You must login to view this content
Weekly Update 474
You're not going to believe this - the criminals that took the Qantas data ignored the injunction 😮 I know, I know, we're all a bit stunned that making crime illegal hasn't appeared to stop it, but here we are. Just before the time
微软为 Windows 10 发布最后一个更新 KB5066791,修复了中文输入法的问题
中国信息安全测评中心主任彭涛:网络靶场 · 数字疆场
PoC Exploit Released for Windows Server Update Services Remote Code Execution Vulnerability
A proof-of-concept (PoC) exploit has been released for a critical vulnerability in Microsoft’s Windows Server Update Services (WSUS), enabling unauthenticated attackers to execute remote code with SYSTEM privileges on affected servers. Dubbed CVE-2025-59287 and assigned a CVSS v3.1 score of 9.8, the flaw stems from unsafe deserialization of untrusted data in WSUS’s AuthorizationCookie handling. Disclosed […]
The post PoC Exploit Released for Windows Server Update Services Remote Code Execution Vulnerability appeared first on Cyber Security News.