Aggregator
CVE-2025-9779 | TOTOLINK A702R 4.0.0-B20211108.1423 /boafrm/formFilter sub_4162DC ip6addr buffer overflow (EUVD-2025-26343)
CVE-2025-9778 | Tenda W12 up to 3.0.0.6(3948) Administrative Interface /etc_ro/shadow hard-coded credentials (EUVD-2025-26339)
Submit #640991: TOTOLINK A702R V4.0.0-B20211108.1423 Buffer Overflow [Accepted]
Submit #640990: TOTOLINK 02R V4.0.0-B20211108.1423 Buffer Overflow [Accepted]
Submit #640989: TOTOLINK A702R V4.0.0-B20211108.1423 Buffer Overflow [Accepted]
Submit #640988: TOTOLINK A702R V4.0.0-B20211108.1423 Buffer Overflow [Accepted]
Submit #640987: TOTOLINK A720R V4.0.0-B20211108.1423 Buffer Overflow [Accepted]
Submit #640969: Tenda AP W12 V1/V2/V3 Hard-coded Credentials [Accepted]
Boards are being told to rethink their role in cybersecurity
Boards of directors are being told that cybersecurity is now central to business resilience and growth, and that they must engage more directly in the way their organizations manage risk. A new report from Google Cloud’s Office of the CISO lays out three areas where board oversight is becoming especially important: ransomware, cyber-enabled fraud, and the intersection of innovation and cybersecurity. Ransomware is shifting to identity and help desks The report describes how ransomware attacks … More →
The post Boards are being told to rethink their role in cybersecurity appeared first on Help Net Security.
JVN: セイコーソリューションズ製SkyBridge BASIC MB-A130におけるOSコマンドインジェクションの脆弱性
Azure AD Client Secret Leak: The Keys to Cloud
CVE-2025-9758 | deepakmisal24 Chemical Inventory Management System up to 1.0 /inventory_form.php chem_name sql injection
CVE-2025-8959 | HashiCorp go-getter up to 1.7.7 link following (EUVD-2025-25049 / Nessus ID 259992)
Cybersecurity signals: Connecting controls and incident outcomes
There is constant pressure on security leaders to decide which controls deserve the most attention and budget. A new study offers evidence on which measures are most closely linked to lower breach risk and how organizations should think about deploying them. Marsh McLennan’s Cyber Risk Intelligence Center (CRIC) analyzed thousands of organizations’ responses to its Cyber Self-Assessment and compared them with claims data. The findings highlight which controls matter most for lowering breach likelihood. Incident … More →
The post Cybersecurity signals: Connecting controls and incident outcomes appeared first on Help Net Security.
CVE-2025-9569 | Sunnet eHRD CTMS cross site scripting (EUVD-2025-26319)
CVE-2025-9570 | Sunnet eHRD CTMS path traversal
CVE-2025-9568 | Sunnet eHRD CTMS cross site scripting (EUVD-2025-26320)
CVE-2025-9567 | Sunnet eHRD CTMS cross site scripting (EUVD-2025-26321)
Netherlands Confirms Chinese Cyber-Espionage Campaign
The Netherlands has officially disclosed a cyber-espionage campaign linked to China that has impacted critical sectors across the
The post Netherlands Confirms Chinese Cyber-Espionage Campaign appeared first on Penetration Testing Tools.