Aggregator
Submit #588368: PHPGurukul Hospital-Management-System 4.0 SQL Injection [Duplicate]
Submit #588341: PHPGurukul Car Rental Project V1.0 Unrestricted Upload [Duplicate]
CVE-2025-23097 | Samsung Mobile Processor Exynos 1380 out-of-bounds write (EUVD-2025-16783)
CVE-2025-23098 | Samsung Mobile Processor Exynos up to 2200 use after free (EUVD-2025-16785)
CVE-2025-23100 | Samsung Mobile Processor Exynos 1280/1380/1480/2200/2400 denial of service (EUVD-2025-16784)
CVE-2025-23102 | Samsung Mobile Processor Exynos up to 9825 double free (EUVD-2025-16776)
CVE-2025-48953 | Umbraco CMS up to 15.4.1 unrestricted upload (GHSA-fr6r-p8hv-x3c4)
CVE-2025-35036 | Hibernate Validator up to 6.1.x Expression Language code injection (EUVD-2025-16774)
CVE-2025-48997 | expressjs multer up to 2.0.0 Upload File uncaught exception (ID 1233)
CVE-2025-48998 | DataEase up to 2.10.9 JDBC Connection sql injection (GHSA-2wfc-qwx7-w692 / EUVD-2025-16761)
CVE-2025-30360 | webpack-dev-server up to 5.2.0 origin validation (GHSA-9jgg-88mc-972h)
CVE-2025-48950 | 1Panel-dev MaxKB 1.9.0/1.10.4-lts/1.10.8 /bin default permission (GHSA-p2qq-x9j2-px8v)
CVE-2025-30359 | webpack-dev-server up to 5.2.0 routine (GHSA-4v9v-hfq4-rm2v)
Upgrading Splunk Universal Forwarders from the Deployment Server
One of the most requested features I hear from clients as a Splunk Managed Services Provider (MSSP) is to have a mechanism for managing the version of the Splunk Universal Forwarder across the environment from the Deployment Server. We could easily manage Splunk configurations for our clients via the Deployment Server, but any UF [...]
The post Upgrading Splunk Universal Forwarders from the Deployment Server appeared first on Hurricane Labs.
The post Upgrading Splunk Universal Forwarders from the Deployment Server appeared first on Security Boulevard.
Victoria's Secret Delays Earnings Call Due to Cyber Incident
Top 10 Advanced Threat Detection Techniques for Modern Cybersecurity
Modern cybersecurity threats have evolved far beyond traditional signature-based detection capabilities, demanding sophisticated approaches that combine artificial intelligence, behavioral analysis, and proactive hunting methodologies. Advanced threat detection now encompasses real-time monitoring, machine learning algorithms, and integrated security platforms that can identify sophisticated attacks, including advanced persistent threats (APTs), zero-day exploits, and insider threats. This comprehensive […]
The post Top 10 Advanced Threat Detection Techniques for Modern Cybersecurity appeared first on Cyber Security News.
Qualcomm security advisory – June 2025 monthly rollup (AV25-315)
Google addresses 34 high-severity vulnerabilities in June’s Android security update
The most serious flaw in the monthly security update affects the Android system and could be exploited to achieve local escalation of privilege, the company said.
The post Google addresses 34 high-severity vulnerabilities in June’s Android security update appeared first on CyberScoop.