Aggregator
CVE-2025-20313 | Cisco IOS XE up to 17.17.1 path traversal (cisco-sa-secboot-UqFD8AvC / EUVD-2025-31029)
CVE-2025-20314 | Cisco IOS XE up to 17.17.1 undefined values (cisco-sa-secboot-UqFD8AvC / EUVD-2025-31020)
郭林祥回忆录
微软为美国和欧洲的 Windows 10 用户提供免费安全更新一年,只要他们用 MS 账号登陆
CVE-2025-10949 | Changsha Developer Technology iView Editor up to 1.1.1 Markdown cross site scripting
Hackers Exploiting Hikvision Camera Vulnerability to Access Sensitive Information
A critical vulnerability in Hikvision security cameras, first disclosed in 2017, is being actively exploited by hackers to gain unauthorized access to sensitive information. SANS researchers observed a recent surge in malicious activity targeting a specific flaw, identified as CVE-2017-7921, which carries a critical severity score of 10.0 on the CVSS scale. The exploit attempts […]
The post Hackers Exploiting Hikvision Camera Vulnerability to Access Sensitive Information appeared first on Cyber Security News.
大规模Android广告欺诈团伙“SlopAds”被瓦解:利用224款恶意应用日均发起23亿次广告请求
大规模Android广告欺诈团伙“SlopAds”被瓦解:利用224款恶意应用日均发起23亿次广告请求
CVE-2025-10948 | MikroTik RouterOS 7 libjson.so /rest/ip/address/print parse_json_element buffer overflow
CVE-2025-10947 | Sistemas Pleno Gestão de Locação up to 2025.7.x CPF validarCpf pes_cpf authorization
Submit #652402: Changsha Developer Technology Co., Ltd. iView Editor <=1.1.1 XSS vulnerability [Accepted]
当 5 亿玩家涌入 AI 的 3D 新世界
Submit #652387: MikroTik RouterOS 7 Memory Corruption [Accepted]
CVE-2025-10946 | nuz007 smsboom up to 01b2f35bbbc23f3e0f60f38ca0e3d1b286f8d674 dy.php hm cross site scripting
CVE-2025-10945 | nuz007 smsboom up to 01b2f35bbbc23f3e0f60f38ca0e3d1b286f8d674 d.php hm cross site scripting
Submit #652282: Sistemas Pleno Gestão de Locação Prior to 2025.8.0 Insecure Direct Object Reference (IDOR) [Accepted]
BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features
Critical vulnerabilities discovered in Supermicro Baseboard Management Controller (BMC) firmware have exposed a troubling pattern where inadequate security fixes create new attack vectors, allowing sophisticated adversaries to bypass signature verification mechanisms and maintain persistent control over enterprise server infrastructure. These flaws, affecting multiple generations of Supermicro motherboards, demonstrate how design weaknesses in firmware validation processes […]
The post BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features appeared first on Cyber Security News.
Predicting DDoS attacks: How deep learning could give defenders an early warning
Distributed denial-of-service (DDoS) attacks remain one of the most common and disruptive forms of cybercrime. Defenders have traditionally focused on detecting these attacks once they are underway. New research suggests that predicting DDoS attacks in advance may be possible, giving security teams a head start in planning their defenses. A new study outlines an approach to forecasting DDoS activity using deep learning. The researchers from Universiti Malaya and Universiti Teknikal Malaysia Melaka analyzed 192,525 DDoS … More →
The post Predicting DDoS attacks: How deep learning could give defenders an early warning appeared first on Help Net Security.