Aggregator
CVE-2025-9608 | Portabilis i-Educar up to 2.10 Formula de Cálculo de Média Page view ID sql injection
CVE-2025-9607 | Portabilis i-Educar up to 2.10 Tabelas de Arredondamento Page view ID sql injection
CVE-2025-9606 | Portabilis i-Educar up to 2.10 agenda_preferencias.php cod_agenda sql injection
Submit #636622: code-projects Online Event Judging System V1.0 SQL Injection [Accepted]
Thousands of Developer Credentials Stolen in macOS “s1ngularity” Attack
Submit #636580: Portabilis i-educar 2.10 Improper Authorization [Accepted]
Submit #636579: Portabilis i-educar 2.10 SQL Injection [Accepted]
Submit #636578: Portabilis i-educar 2.10 SQL Injection [Accepted]
Submit #636577: Portabilis i-educar 2.10 SQL Injection [Accepted]
Threat Actors Abuse Velociraptor Incident Response Tool to Gain Remote Access
A sophisticated intrusion in which threat actors co-opted the legitimate, open-source Velociraptor digital forensics and incident response (DFIR) tool to establish a covert remote access channel. This represents an evolution from the long-standing tactic of abusing remote monitoring and management (RMM) utilities, with attackers now repurposing DFIR frameworks to minimize custom malware deployment and evade […]
The post Threat Actors Abuse Velociraptor Incident Response Tool to Gain Remote Access appeared first on Cyber Security News.
CVE-2025-9605 | Tenda AC21/AC23 16.03.08.16 GetParentControlInfo mac stack-based overflow
美国共和党人调查维基百科的自由主义偏见
Kairos
You must login to view this content
Submit #636548: Tenda Wi-Fi 5 Router AC23 AC23V1.0re_V16.03.07.52 Buffer Overflow [Duplicate]
Submit #636545: Tenda Wi-Fi 5 Router AC21 AC21V1.0re_V16.03.08.16 Buffer Overflow [Accepted]
CVE-2025-56236 | FormCms 0.5.5 Avatar Upload cross site scripting (Issue 27 / EUVD-2025-26075)
CVE-2025-54995 | Asterisk up to 18.9-cert16/18.26.3 improper validation of syntactic correctness of input (EUVD-2025-26134)
Nevada IT Systems Hit by Cyberattack – State Office Closed for Two Days
A significant cyberattack disrupted Nevada’s state government network on August 24, forcing all state office branches to shut down operations for 48 hours. The intrusion began with the exploitation of an unpatched VPN gateway, allowing the threat actor to gain initial foothold on the internal network. Within hours, the attackers deployed a custom malware payload […]
The post Nevada IT Systems Hit by Cyberattack – State Office Closed for Two Days appeared first on Cyber Security News.