Aggregator
Command Injection Flaw in Palo Alto PAN-OS Allows Root-Level Code Execution
A newly disclosed command injection vulnerability (CVE-2025-4230) in Palo Alto Networks PAN-OS software enables authenticated administrators to bypass restrictions and execute arbitrary commands with root privileges. With a CVSS v4.0 score of 5.7 (Medium severity), this flaw highlights risks in privileged access management for network security appliances. Vulnerability Overview and Attack Vector The vulnerability stems […]
The post Command Injection Flaw in Palo Alto PAN-OS Allows Root-Level Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
INC
You must login to view this content
CVE-2025-2254 | GitLab Community Edition/Enterprise Edition up to 17.10.7/17.11.3/18.0.1 cross site scripting (Issue 524636 / EUVD-2025-18168)
CVE-2025-0673 | GitLab Community Edition/Enterprise Edition up to 17.10.7/17.11.3/18.0.1 infinite loop (Issue 514732 / EUVD-2025-18171)
CVE-2025-5195 | GitLab Community Edition/Enterprise Edition up to 17.10.7/17.11.3/18.0.1 authorization (Issue 534960 / EUVD-2025-18172)
CVE-2025-5996 | GitLab Community Edition/Enterprise Edition up to 17.10.6/17.11.2/18.0.0 allocation of resources (Issue 476671 / EUVD-2025-18170)
CVE-2025-4278 | GitLab Community Edition/Enterprise Edition up to 18.0.1 cross site scripting (Issue 539198 / EUVD-2025-18169)
CVE-2025-1516 | GitLab Community Edition/Enterprise Edition up to 17.10.7/17.11.3/18.0.1 allocation of resources (Issue 520553 / EUVD-2025-18167)
CVE-2025-1478 | GitLab Community Edition/Enterprise Edition up to 17.10.7/17.11.3/18.0.1 allocation of resources (Issue 520354 / EUVD-2025-18166)
CVE-2025-4613 | Google Web Designer App prior 16.3.0.0407 on Windows Template input validation (EUVD-2025-18165)
CISA Releases Ten Industrial Control Systems Advisories
CISA released ten Industrial Control Systems (ICS) advisories on June 12, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-162-01 Siemens Tecnomatix Plant Simulation
- ICSA-25-162-02 Siemens RUGGEDCOM APE1808
- ICSA-25-162-03 Siemens SCALANCE and RUGGEDCOM
- ICSA-25-162-04 Siemens SCALANCE and RUGGEDCOM
- ICSA-25-162-05 Siemens SIMATIC S7-1500 CPU Family
- ICSA-25-162-06 Siemens Energy Services
- ICSA-25-162-07 AVEVA PI Data Archive
- ICSA-25-162-08 AVEVA PI Web API
- ICSA-25-162-09 AVEVA PI Connector for CygNet
- ICSA-25-162-10 PTZOptics and Other Pan-Tilt-Zoom Cameras
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
CISA Releases Cybersecurity Advisory on SimpleHelp RMM Vulnerability
Today, CISA released Cybersecurity Advisory: Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider.
This advisory is in response to ransomware actors targeting customers of a utility billing software provider through unpatched vulnerabilities in SimpleHelp Remote Monitoring and Management (RMM).
This incident is part of a broader trend of ransomware actors exploiting unpatched versions of SimpleHelp RMM since January 2025.
SimpleHelp versions 5.5.7 and earlier contain multiple vulnerabilities, including CVE-2024-57727, a path traversal vulnerability. Ransomware actors likely exploited CVE-2024-57727 to access downstream customers’ unpatched SimpleHelp RMM, resulting in service disruptions and double extortion incidents.
CISA added CVE-2024-57727 to its Known Exploited Vulnerabilities Catalog on February 13, 2025.
Organizations using SimpleHelp RMM should:
- Search for evidence of compromise,
- Apply the mitigations outlined in the advisory such as patching CVE-2024-57727 and/or implementing appropriate workarounds to prevent or respond to confirmed or potential compromises, and
- Follow CISA’s Known Exploited Vulnerabilities Catalog.
The Impact of Artificial Intelligence on the Cybersecurity Workforce
【已复现】GeoServer SSRF和XXE漏洞
CNNVD关于微软多个安全漏洞的通报
7月暑期活动 | 日本 • 青少年侦探夏日营二期
Apache Tomcat Partial PUT漏洞学习
Trend Micro Apex One Zero-Day Vulnerability Enables Attackers to Inject Malicious Code
Trend Micro has issued an urgent security bulletin addressing five critical vulnerabilities in its Apex One endpoint security platform that could allow attackers to execute arbitrary code and escalate privileges on affected systems. The vulnerabilities, assigned CVE identifiers CVE-2025-49154 through CVE-2025-49158, were disclosed on June 9, 2025, with CVSS scores ranging from 6.7 to 8.8, […]
The post Trend Micro Apex One Zero-Day Vulnerability Enables Attackers to Inject Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.