Aggregator
CVE-2026-42249 | Ollama up to 0.17.5 on Windows Update code download (EUVD-2026-26211)
CVE-2026-42248 | Ollama up to 0.17.5 on Windows Digital Signature code download (EUVD-2026-26210)
CVE-2026-2902 | aguidrevitch WP Meteor Website Speed Optimization Addon Plugin up to 3.4.16 on WordPress frontend_rewrite cross site scripting (EUVD-2026-26209)
CVE-2026-22745 | Vmware Spring Framework up to 5.3.47/6.1.26/6.2.17/7.0.6 on Windows MVC/WebFlux resource consumption (EUVD-2026-26207)
Submit #803612: getsimpletool simpletool-server 035efb1c98076ca3febd5e1f5fc3960f81a16af8 Pathname Traversal [Accepted]
CVE-2026-22741 | Vmware Spring Framework up to 5.3.47/6.1.26/6.2.17/7.0.6 MVC/WebFlux cache containing sensitive information (EUVD-2026-26206)
Submit #803530: geldata gel-mcp 0.1.0 Path Traversal [Accepted]
Brinker Introduces a Novel Approach to Deepfake Detection
Cursor AI Coding Agent Vulnerability Allow Attackers to Execute Code on Developer’s Machine
A high-severity vulnerability in Cursor, one of the most widely used AI-powered coding environments today, has put developers at direct risk of remote code execution. Tracked as CVE-2026-26268, the flaw allows an attacker to run arbitrary code on a developer’s local machine simply by getting them to clone a malicious repository. The most alarming part […]
The post Cursor AI Coding Agent Vulnerability Allow Attackers to Execute Code on Developer’s Machine appeared first on Cyber Security News.
GitHub fixes RCE flaw that gave access to millions of private repos
CVE-2022-23122 | Netatalk up to 3.1.12 setfilparams stack-based overflow (ZDI-22-529 / EUVD-2022-28213)
CVE-2022-23044 | Tiny File Manager 2.4.8 cross-site request forgery (EUVD-2022-28154)
CVE-2022-23005 | Host Boot ROM UFS security-sensitive hardware controls with missing lock bit protection (EUVD-2022-28116)
CVE-2022-22995 | Western Digital My Cloud/WD Cloud link following (EUVD-2022-28106 / Nessus ID 211927)
CVE-2020-2091 | Amazon EC2 Plugin up to 1.47 on Jenkins Permission Check improper authorization (EUVD-2022-2802)
SLOTAGENT Malware Uses API Hashing and Encrypted Strings to Hinder Reverse Engineering
A newly identified malware called SLOTAGENT has drawn attention in the cybersecurity community for its strong ability to resist analysis and avoid detection. The malware does not rely on brute force tactics. Instead, it uses two precise techniques, API hashing and encrypted strings, to make reverse engineering extremely difficult for researchers. This level of technical […]
The post SLOTAGENT Malware Uses API Hashing and Encrypted Strings to Hinder Reverse Engineering appeared first on Cyber Security News.