Aggregator
5,8 млн сайтов сдали вас Meta, 3 млн — Яндексу. Прямо в приложение
威胁情报 | 海莲花组织疑似针对国产操作系统及 IOT 设备发起攻击
Police arrests 20 suspects for distributing child sexual abuse content
CVE-2025-48910 | Huawei HarmonyOS 4.3.0/5.0.0 DFile Module heap-based overflow (EUVD-2025-17065)
CVE-2025-48911 | Huawei HarmonyOS 5.0.0 Note Sharing Module privileges assignment (EUVD-2025-17064)
CVE-2025-48907 | Huawei HarmonyOS 5.0.0 IPC Module uncaught exception (EUVD-2025-17084)
CVE-2025-48908 | Huawei HarmonyOS 5.0.0 Ability Auto Startup Service unsynchronized access to shared data in a multithreaded context (EUVD-2025-17063)
CVE-2025-31171 | Huawei HarmonyOS 5.0.0 Kernel File System information disclosure (EUVD-2025-9947)
CVE-2025-4191 | PHPGurukul Employee Record Management System 1.3 /editmyeducation.php coursepg/yophsc sql injection (EUVD-2025-12813)
CVE-2025-4412 | SparkLabs Viscosity up to 1.11.4 on macOS viscosity_openvpn default permission (EUVD-2025-17060)
PoC Exploit Released for Apache Tomcat DoS Vulnerability
A proof-of-concept exploit targeting a critical denial-of-service vulnerability in Apache Tomcat has been publicly released, exposing servers running versions 10.1.10 through 10.1.39 to potential attacks. The exploit, designated as CVE-2025-31650, leverages malformed HTTP/2 priority headers to cause memory exhaustion on vulnerable Tomcat instances. Security researcher Abdualhadi Khalifa developed and published the exploit code on June […]
The post PoC Exploit Released for Apache Tomcat DoS Vulnerability appeared first on Cyber Security News.
科学家通过脑机接口恢复失明动物视觉功能
CVE-2025-3365 | B. Braun OnlineSuite 3.0 path traversal (EUVD-2025-17091)
CVE-2025-3322 | B. Braun OnlineSuite 3.0 expression language injection (EUVD-2025-17092)
CVE-2025-5799 | Tenda AC8 16.03.34.09 /goform/WifiExtraSet fromSetWirelessRepeat wpapsk_crypto stack-based overflow
CVE-2025-5798 | Tenda AC8 16.03.34.09 /goform/SetSysTimeCfg fromSetSysTime timeType stack-based overflow
New pathWiper Malware Targets Critical Infrastructure to Deploy Admin Tools
Cisco Talos has uncovered a sophisticated and destructive cyberattack targeting a critical infrastructure entity in Ukraine, deploying a previously unknown wiper malware dubbed “PathWiper.” This attack, attributed with high confidence to a Russia-nexus advanced persistent threat (APT) actor, showcases the persistent and evolving threat to Ukrainian critical infrastructure amid the ongoing Russia-Ukraine conflict. The attackers […]
The post New pathWiper Malware Targets Critical Infrastructure to Deploy Admin Tools appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.