Aggregator
CVE-2025-46575 | ZTE GoldenDB up to 6.1.03.10/7.2.01.01/Lite7.2.01.01 information exposure
CVE-2025-46574 | ZTE GoldenDB up to 6.1.03.10/7.2.01.01/Lite7.2.01.01 information exposure
CVE-2025-46580 | ZTE GoldenDB up to 6.1.03.10 resource consumption
CVE-2025-46673 | NASA CryptoLib up to 1.3.1 Space Data Link Security Protocol dynamically-managed code resources
CVE-2025-46655 | HackMD CodiMD up to 2.5.4 Content-Security-Policy Header improper protection of alternate path (Issue 1910)
CVE-2025-46654 | HackMD CodiMD up to 2.2.0 improper protection of alternate path (Issue 1910)
CVE-2025-46579 | ZTE GoldenDB up to 6.1.03.10/7.2.01.01 DDE code injection
CVE-2025-46578 | ZTE GoldenDB up to 6.1.03.10/7.2.01.01 sql injection
CVE-2025-46576 | ZTE GoldenDB up to 6.1.03.10 privileges management
CVE-2025-46656 | python-markdownify up to 0.14.0 Headline Prefix improper validation of specified quantity in input (ID 143)
CVE-2025-46653 | Formidable up to 3.5.2 weak prng
CVE-2025-46652 | IZArc up to 4.5 Archive File inclusion of web functionality from an untrusted source (GHSA-637g-8v47-79mv)
RSAC 2025创新沙盒 | CalypsoAI:锻造AI系统安全防护体系的实战路径与信任基石
银行业冲刺生成式 AI:“云、数、安”三大基建成投资主力
CVE-2024-53636 | Serosoft Academia Student Information System 1.0.118 writefile.php filePath path traversal
CVE-2025-46674 | NASA CryptoLib up to 1.3.1 Extended Procedures debug code
Week in review: MITRE ATT&CK v17.0 released, PoC for Erlang/OTP SSH bug is public
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs MITRE has released the latest version of its ATT&CK framework, which now also includes a new section (“matrix”) to cover the tactics, techniques and procedures (TTPs) used to target VMware ESXi hypervisors. PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433) There are now several public proof-of-concept (PoC) exploits for … More →
The post Week in review: MITRE ATT&CK v17.0 released, PoC for Erlang/OTP SSH bug is public appeared first on Help Net Security.
Building Trust Through Transparency – CISO Cybersecurity Practices
In an era of digital transformation and rising cyber threats, Building Trust Through Transparency has become a critical mission for the Chief Information Security Officer (CISO), who has evolved from a technical expert to a strategic leader responsible for protecting organizational trust. Transparency in cybersecurity practices is no longer optional but critical to effective leadership. […]
The post Building Trust Through Transparency – CISO Cybersecurity Practices appeared first on Cyber Security News.