Aggregator
Security professionals: what’s a vulnerability you discovered that made you question how the system ever passed testing?
4 weeks ago
好的,我现在需要帮用户总结这篇文章的内容。用户的要求是用中文总结,控制在100字以内,而且不需要以“文章内容总结”或“这篇文章”这样的开头,直接写描述即可。
首先,我仔细阅读了文章内容。文章主要讨论了最近的一些软件漏洞和网络安全问题。包括Windows的两个漏洞CVE-2025-9491和CVE-2025-59287,前者尚未修补,后者修复不完整。此外,还提到了BYOVD攻击、配置错误、恶意浏览器扩展以及Fortinet和Ivanti的零日漏洞。资源方面提到了OpenCVE.io和Exploit-DB.com,还有相关的Subreddit社区。
接下来,我需要将这些信息浓缩到100字以内。要抓住关键点:主要漏洞、攻击方式、配置问题、恶意扩展、厂商问题以及资源和社区。
然后,我组织语言,确保信息准确且简洁。例如,“Windows的两个关键漏洞”可以涵盖CVE部分,“BYOVD攻击”直接点出攻击方式,“配置错误”简明扼要,“恶意浏览器扩展”说明威胁来源,“厂商修补问题”涉及伦理问题,“资源如OpenCVE.io和Exploit-DB.com”提供工具支持,“社区如r/cybersecurity等”帮助用户获取更多信息。
最后,检查字数是否在限制内,并确保没有使用任何开头模板。这样就能满足用户的所有要求了。
文章讨论了近期网络安全威胁,包括Windows未修补漏洞、BYOVD攻击、配置错误、恶意浏览器扩展及厂商修补问题,并提供了跟踪资源如OpenCVE.io和Exploit-DB.com及社区如r/cybersecurity等。
Update: base64dump.py Version 0.0.29
4 weeks ago
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述就行。看起来用户可能是在寻找一个简洁明了的摘要,可能用于快速了解文章内容或者分享给他人。
首先,我需要仔细阅读用户提供的文章内容。看起来这篇文章主要是一个个人博客的页面,里面列出了各种工具、软件和资源。比如Didier Stevens Suite、各种工具如Authenticode Tools、Binary Tools等等。还有分类目录,包括恶意软件分析、逆向工程、网络取证等等。此外,博客还有一些统计信息和归档链接。
接下来,我需要提取关键信息:作者是Didier Stevens,他提供了多种安全分析工具和资源。这些工具涉及恶意软件分析、逆向工程、网络取证等多个领域。博客还包含归档和分类目录,方便用户查找相关内容。
然后,我要确保总结控制在100字以内,并且直接描述内容,不使用开头语。可能的结构是:作者+提供的资源+资源类型+其他功能。
最后,检查一下是否符合要求:简洁、准确、不超过100字,并且没有使用禁止的开头语。
Didier Stevens提供多种安全分析工具和资源,涵盖恶意软件分析、逆向工程和网络取证等领域,并包含分类目录和归档链接。
The Developer’s Practical Guide to Passwordless Authentication in 2026
4 weeks ago
The Developer's Practical Guide to Passwordless Authentication in 2026
The post The Developer’s Practical Guide to Passwordless Authentication in 2026 appeared first on Security Boulevard.
MojoAuth Blog - Passwordless Authentication & Identity Solutions
CVE-2026-26194 | Gogs up to 0.14.1 argument injection (GHSA-v9vm-r24h-6rqm / WID-SEC-2026-0623)
4 weeks ago
A vulnerability, which was classified as critical, was found in Gogs up to 0.14.1. The impacted element is an unknown function. Executing a manipulation can lead to argument injection.
This vulnerability is handled as CVE-2026-26194. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
vuldb.com
CVE-2026-28209 | FreePBX up to 16.0.19/17.0.4 Recordings os command injection (GHSA-f558-mp87-58vj)
4 weeks ago
A vulnerability was found in FreePBX up to 16.0.19/17.0.4 and classified as critical. This impacts an unknown function of the component Recordings Module. The manipulation results in os command injection.
This vulnerability was named CVE-2026-28209. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-28210 | FreePBX up to 16.0.48/17.0.6 sql injection (GHSA-59gp-632h-c54v)
4 weeks ago
A vulnerability was found in FreePBX up to 16.0.48/17.0.6. It has been classified as critical. Affected is an unknown function. This manipulation causes sql injection.
The identification of this vulnerability is CVE-2026-28210. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-28284 | FreePBX up to 16.0.9/17.0.4 Logfile sql injection (GHSA-4887-4jwp-327g)
4 weeks ago
A vulnerability was found in FreePBX up to 16.0.9/17.0.4. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Logfile Module. Such manipulation leads to sql injection.
This vulnerability is referenced as CVE-2026-28284. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2026-28287 | FreePBX up to 16.0.19/17.0.4 Recordings os command injection (GHSA-9vv6-h8v6-rp4q)
4 weeks ago
A vulnerability was found in FreePBX up to 16.0.19/17.0.4. It has been rated as critical. Affected by this issue is some unknown functionality of the component Recordings Module. Performing a manipulation results in os command injection.
This vulnerability is identified as CVE-2026-28287. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-26195 | Gogs up to 0.14.1 cross site scripting (GHSA-vgvf-m4fw-938j / WID-SEC-2026-0623)
4 weeks ago
A vulnerability marked as problematic has been reported in Gogs up to 0.14.1. Impacted is an unknown function. This manipulation causes cross site scripting.
This vulnerability is registered as CVE-2026-26195. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-26022 | Gogs up to 0.14.1 cross site scripting (GHSA-xrcr-gmf5-2r8j / WID-SEC-2026-0623)
4 weeks ago
A vulnerability classified as problematic has been found in Gogs up to 0.14.1. The impacted element is an unknown function. Performing a manipulation results in cross site scripting.
This vulnerability is reported as CVE-2026-26022. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2026-26418 | Tata Consultancy Services Cognix Recon Client 3.0 missing authentication (EUVD-2026-9842)
4 weeks ago
A vulnerability was found in Tata Consultancy Services Cognix Recon Client 3.0. It has been declared as critical. This affects an unknown function. The manipulation results in missing authentication.
This vulnerability is identified as CVE-2026-26418. The attack can be executed remotely. There is not any exploit available.
vuldb.com
CVE-2026-26417 | Tata Consultancy Services Cognix Recon Client 3.0 password recovery (EUVD-2026-9841)
4 weeks ago
A vulnerability marked as critical has been reported in Tata Consultancy Services Cognix Recon Client 3.0. This affects an unknown part. The manipulation leads to weak password recovery.
This vulnerability is documented as CVE-2026-26417. The attack can be initiated remotely. There is not any exploit available.
vuldb.com
CVE-2026-26416 | Tata Consultancy Services Cognix Recon Client 3.0 authorization (EUVD-2026-9840)
4 weeks ago
A vulnerability labeled as critical has been found in Tata Consultancy Services Cognix Recon Client 3.0. This impacts an unknown function. Such manipulation leads to authorization bypass.
This vulnerability is documented as CVE-2026-26416. The attack can be executed remotely. There is not any exploit available.
vuldb.com
CVE-2025-70616 | Wincor Nixdorf wnBios64.sys 1.2.0.0 IOCTL stack-based overflow (EUVD-2025-208323)
4 weeks ago
A vulnerability categorized as critical has been discovered in Wincor Nixdorf wnBios64.sys 1.2.0.0. This affects an unknown part of the component IOCTL Handler. Executing a manipulation can lead to stack-based buffer overflow.
This vulnerability is tracked as CVE-2025-70616. The attack is only possible within the local network. No exploit exists.
vuldb.com
CVE-2026-30839 | ellite Wallos up to 4.6.1 testwebhooknotifications.php server-side request forgery (GHSA-x4qp-xm2c-vqg9 / EUVD-2026-10119)
4 weeks ago
A vulnerability was found in ellite Wallos up to 4.6.1. It has been classified as critical. Impacted is an unknown function of the file testwebhooknotifications.php. This manipulation causes server-side request forgery.
This vulnerability is registered as CVE-2026-30839. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-30842 | ellite Wallos up to 4.6.1 Avatar Deletion Endpoint authorization (GHSA-qw24-3pxr-3j6r / EUVD-2026-10122)
4 weeks ago
A vulnerability classified as problematic has been found in ellite Wallos up to 4.6.1. This affects an unknown part of the component Avatar Deletion Endpoint. Performing a manipulation results in missing authorization.
This vulnerability was named CVE-2026-30842. The attack may be initiated remotely. There is no available exploit.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2026-30828 | ellite Wallos up to 4.6.1 URL Parameter path traversal (GHSA-p7qj-669r-grvc / EUVD-2026-10116)
4 weeks ago
A vulnerability classified as problematic was found in ellite Wallos up to 4.6.1. The affected element is an unknown function of the component URL Parameter Handler. The manipulation results in path traversal: '\..\filename'.
This vulnerability was named CVE-2026-30828. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-30840 | ellite Wallos up to 4.6.1 Notifications server-side request forgery (GHSA-mr2c-prqv-hqm8 / EUVD-2026-10120)
4 weeks ago
A vulnerability, which was classified as critical, has been found in ellite Wallos up to 4.6.1. The impacted element is an unknown function of the component Notifications Handler. This manipulation causes server-side request forgery.
The identification of this vulnerability is CVE-2026-30840. It is possible to initiate the attack remotely. There is no exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-3671 | Freedom Factory dGEN1 up to 20260221 org.ethereumphone.walletmanager.testing123 TokenBalanceContentProvider improper authorization (EUVD-2026-10188)
4 weeks ago
A vulnerability was found in Freedom Factory dGEN1 up to 20260221. It has been declared as problematic. Affected by this vulnerability is the function TokenBalanceContentProvider of the component org.ethereumphone.walletmanager.testing123. Executing a manipulation can lead to improper authorization.
This vulnerability appears as CVE-2026-3671. The attack requires local access. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com