Aggregator
CVE-2025-50985 | diskover-web Community Edition 2.3.0 Web Interface maxage/maxindex/index/path/q/doctype cross site scripting
CVE-2025-52122 | Freeform up to 5.10.15 on CraftCMS special elements used in a template engine
CVE-2025-56694 | lumasoft fotoShare Cloud 2025-03-13 Password Validation improper authentication
CVE-2025-50986 | diskover-web Community Edition 2.3.0 Administrative Settings Interface cross site scripting
Citrix NetScaler Devices Yet Again Under Attack
NetScaler customers of virtualization giant Citrix once again should patch immediately to stymie the hackers exploiting a zero-day. Citrix warned Tuesday that hackers are using a memory overflow vulnerability now tracked as CVE-2025-7775. The vulnerability carries a CVSS score of 9.2.
Okta to Purchase Axiom Security to Bolster Privileged Access
By acquiring startup Axiom Security, Okta aims to enhance privileged access by offering broader coverage of sensitive assets like Kubernetes containers and databases. The company says the move accelerates value delivery and complements Okta's existing privileged access capabilities.
Whistleblower: DOGE Made Live Copy of Social Security Data
The Social Security Administration's chief data officer is warning in a whistleblower complaint that DOGE created a cloud replica of the Social Security database without proper authorization or oversight, potentially exposing the personal data of 300 million Americans.
Transparent Tribe Deploys Malicious Files Against India Govt
Pakistan-linked hackers are targeting an Indian Linux-based operating system by tricking government employees into clicking malicious files that look like PDFs. When opened, the files install spyware, giving attackers long-term access to sensitive government systems.
Randall Munroe’s XKCD ‘Where Babies Come From’
via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Where Babies Come From’ appeared first on Security Boulevard.
Microsoft details Storm-0501’s focus on ransomware in the cloud
The financially motivated threat group demonstrates deep knowledge of hybrid cloud environments, which allows it to rapidly steal sensitive data, destroy backups and encrypt systems for ransomware.
The post Microsoft details Storm-0501’s focus on ransomware in the cloud appeared first on CyberScoop.
CVE-2025-43882 | Dell ThinOS 10 prior 2508_10.0127 unverified ownership (dsa-2025-331)
CVE-2025-43729 | Dell ThinOS 10 prior 2508_10.0127 permission assignment (dsa-2025-331)
CVE-2025-43730 | Dell ThinOS 10 prior 2508_10.0127 argument injection (dsa-2025-331)
CVE-2025-50984 | diskover-web Community Edition 2.3.0 sql injection (EUVD-2025-25907)
CVE-2025-50983 | readarr 0.4.15.2787 API Endpoint /api/v1/wanted/cutoff sortKey sql injection
CVE-2025-53105 | glpi up to 10.0.18 privileges management (GHSA-334r-2682-95wc)
CVE-2025-43728 | Dell ThinOS 10 prior 2508_10.0127 protection mechanism (dsa-2025-331)
CVE-2025-50972 | AbanteCart 1.4.2 index.php tmpl_id sql injection
CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits
CISA released three significant Industrial Control Systems (ICS) advisories on August 26, 2025, alerting organizations to critical vulnerabilities affecting widely-deployed automation systems. These advisories highlight severe security flaws across INVT Electric’s engineering tools, Schneider Electric’s Modicon controllers, and Danfoss refrigeration systems, with CVSS v4 scores reaching 8.7, indicating high-severity exploitable conditions. Key Takeaways1. CISA issued […]
The post CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits appeared first on Cyber Security News.