Aggregator
CVE-2025-30321 | Adobe InDesign Desktop up to 19.5.3/20.2 null pointer dereference (apsb25-53)
CVE-2023-29184 | Fortinet FortiProxy/FortiOS CLI cleanup (FG-IR-23-008)
CVE-2025-36575 | Dell Wyse Management Suite up to 5.1 information exposure (dsa-2025-226)
SAP NetWeaver Vulnerability Allows Attackers to Escalate Privileges
A critical vulnerability in the SAP NetWeaver Application Server AS ABAP has been disclosed under SAP Security Note #3600840, carrying a near-maximum CVSS score of 9.6. This flaw, rooted in a Missing Authorization Check within the Remote Function Call (RFC) framework, poses a severe risk to system integrity and availability. Authenticated attackers can exploit this […]
The post SAP NetWeaver Vulnerability Allows Attackers to Escalate Privileges appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-47969 | Microsoft Windows 11 22H2/11 23H2/11 24H2/Server 2025 Virtualization-Based Security information disclosure
Microsoft June 2025 Patch Tuesday fixes exploited zero-day, 66 flaws
SAP security advisory – June 2025 monthly rollup (AV25-330)
United Natural Food's Operations Limp Through Cybersecurity Incident
CVE-2025-47968 | Microsoft AutoUpdate on macOS input validation
CVE-2025-47962 | Microsoft Windows SDK access control
CVE-2025-47959 | Microsoft Visual Studio 2022 command injection
CVE-2025-47957 | Microsoft Word use after free
Windows 11 KB5060842 and KB5060999 cumulative updates released
CVE-2025-47956 | Microsoft Windows Security App file inclusion
CVE-2025-47955 | Microsoft Windows up to Server 2025 Remote Access Connection Manager privileges management
CVE-2025-47953 | Microsoft Office improper restriction of names for files and other resources
SAP June 2025 Security Patch Day fixed critical NetWeaver bug
CVE-2025-33053, Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage
Notorious APT group, Stealth Falcon, attacks high-profile targets in the Middle East with a .url file that uses a LOLBin (Living off the Land Binary) to execute malware from an actor-controlled WebDAV server with a technique we named Remote Path Interception by Search Order Hijacking.
The post CVE-2025-33053, Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage appeared first on Check Point Research.