Aggregator
CVE-2023-22226 | Adobe Bridge up to 12.0.3/13.0.1 stack-based overflow (apsb23-09 / EUVD-2023-26390)
CVE-2023-22227 | Adobe Bridge up to 12.0.3/13.0.1 out-of-bounds write (apsb23-09 / EUVD-2023-26391)
CVE-2023-45278 | Yamcs 5.8.6 HTTP Request path traversal (EUVD-2023-2638)
CVE-2023-43340 | Evolution CMS 3.2.3 cross site scripting (EUVD-2023-2634)
CVE-2025-10954 | nyaruka phonenumbers up to 1.2.1 phonenumbers.Parse improper validation of syntactic correctness of input (EUVD-2025-31408)
CVE-2025-3193 | algoliasearch-helper up to 3.11.1 Search Parameter merge.js _merge prototype pollution (SNYK-JS-ALGOLIASEARCHHELPER-3318396 / EUVD-2025-31407)
CVE-2025-59845 | apollographql embeddable-explorer up to 2.7.1/3.7.2 origin validation (GHSA-w87v-7w53-wwxv / EUVD-2025-31347)
CVE-2025-57692 | PiranhaCMS 12.0 Standard Archive Page /manager/pages cross site scripting (EUVD-2025-31385)
CVE-2025-36144 | IBM Lakehouse 2.2 watsonx.data log file (EUVD-2025-31397 / CNNVD-202509-4278)
CVE-2025-59936 | nearform get-jwks up to 11.0.1 iss escape output (GHSA-qc2q-qhf3-235m / EUVD-2025-31349)
CVE-2025-59945 | Syslifters sysreptor up to 2025.82 privileges assignment (GHSA-r6hm-59cq-gjg6 / EUVD-2025-31400)
CVE-2025-10657 | Docker Desktop 4.46.0 Enhanced Container Isolation privileges management (EUVD-2025-31391)
CVE-2025-59934 | Formbricks up to 4.0.0 JWT signature verification (GHSA-7229-q9pv-j6p4 / EUVD-2025-31394)
CVE-2025-59938 | Wazuh up to 4.10.x EventChannel Message heap-based overflow (GHSA-vw3r-mjg3-9hh2 / EUVD-2025-31396)
CVE-2025-36239 | IBM Storage TS4500 Library 1.11.0.0/2.11.0.0 Web UI cross site scripting (EUVD-2025-31399 / CNNVD-202509-4271)
CVE-2025-59932 | FlagForgeCTF flagForge up to 2.3.0 /api/resources improper authorization (GHSA-v8rh-25rf-gfqw / EUVD-2025-31401)
CVE-2025-59939 | LabRedesCefetRJ WeGIA up to 3.4.x control.php id_produto sql injection (GHSA-jx9m-pgf8-v489 / EUVD-2025-31395)
CVE-2024-43192 | IBM Storage TS4500 Library 1.11.0.0/2.11.0.0 cross-site request forgery (EUVD-2024-55025 / CNNVD-202509-4272)
China Prepares for Cyberattacks
China has implemented regulations for 1-hour reporting of severe cybersecurity incidents. This would include disruptions that impact over 50% of the people in a province or 10 million people, such as critical infrastructure attacks.
The irony is that China is recognized for its advanced and aggressive foreign cyber operations. But there is brilliance in this requirement. China has an excellent perspective in how such attacks can be used to disrupt adversaries and push foreign policy. It doesn’t want to suffer in ways that other nations might and therefore is improving its response and recovery capabilities.
In contrast, when the US SEC required public companies to report material outages within 4 days beginning in 2025, there was upheaval with some cybersecurity leaders, stating that it was impossible or at the very least irresponsible. They lobbied Congress to repeal the requirements. Since the regulation took effect, no major issues have arisen from the 4-day requirement.
The vast majority of US critical infrastructure is operated by private industry and concealing cybersecurity compromises only benefits the attackers.
The Cybersecurity and Infrastructure Security Agency (CISA) is also looking to update rules specifically for US critical infrastructure, mandating a 72-hour notification, but the final rule may not be published until mid-2026.
China knows something and realizes the importance of early reporting. Even the most aggressive US reporting proposals falls far short of the 1-hour requirement in China.
I hope my peers will remain calm, realize the necessity, and support early notification in the US.
The post China Prepares for Cyberattacks appeared first on Security Boulevard.