Aggregator
CVE-2011-10019 | Spreecommerce up to 0.60.1 search[send][] code injection (EUVD-2011-5240 / EDB-17941)
CVE-2011-10013 | Traq Project Issue Tracking System up to 2.2 admincp/common.php code injection (EUVD-2011-5239 / EDB-18213)
CVE-2011-10009 | S40 CMS 0.4.2 File Extension index.php path traversal (EUVD-2011-5242 / EDB-17129)
CVE-2011-10017 | Symmetrix Snort Report up to 1.3.1 nmap.php target os command injection (EUVD-2011-5241 / EDB-17947)
CVE-2012-10056 | PHP Volunteer Management System 1.0.2 mods/documents/uploads/ unrestricted upload (EDB-18941)
CVE-2011-10011 | WeBid up to 1.0.2 POST Request converter.php code injection (EUVD-2011-5238 / EDB-17487)
CVE-2012-10059 | Dolibarr ERP/CRM up to 3.1.1/3.2.0 Database Backup sql_compat os command injection (EDB-18724)
CVE-2011-10018 | MyBB 1.6.4 backdoor (EDB-17949 / SA46300)
Russia restricts WhatsApp, Telegram calls, alleging criminal, terrorist activity
The two messaging apps replied separately, commenting on user rights and efforts to counter crime.
The post Russia restricts WhatsApp, Telegram calls, alleging criminal, terrorist activity appeared first on CyberScoop.
CVE-2025-53786
Fortinet Products Are in the Crosshairs Again
Support Your Cybersecurity with Strong NHI Practices
Why Should NHI Practices Be a Core Component of Your Cybersecurity Strategy? A question frequently on the minds of executives and professionals is: What is the role of Non-Human Identities (NHI) management in fortifying an organization’s security posture? This question is of prime importance as companies increasingly navigate digital, where NHIs – the machine identities […]
The post Support Your Cybersecurity with Strong NHI Practices appeared first on Entro.
The post Support Your Cybersecurity with Strong NHI Practices appeared first on Security Boulevard.
Intel security advisory (AV25-511)
CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild
The U.S. Cybersecurity and Infrastructure Security Agency has added this vulnerability to its Known Exploited Vulnerabilities catalog, with a due date of September 2, 2025, for federal agencies to apply mitigations. WinRAR has released version 7.13 to address a critical security vulnerability that has been actively exploited by cybercriminals, marking another significant security incident for […]
The post CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild appeared first on Cyber Security News.
CVE-2025-25256: Fortinet FortiSIEM OS Command Injection Vulnerability, Exploit in the Wild
Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild
Foxit security advisory (AV25-510)
Ноль градусов или 25? Физики разрушили главное правило квантового мира.
Microsoft Removes PowerShell 2.0 From Windows To Clean Up Legacy Code
Microsoft is officially removing Windows PowerShell 2.0 from its operating systems, marking the end of an era for the legacy scripting component that has been deprecated since 2017. The removal affects Windows 11 version 24H2 starting August 2025 and Windows Server 2025 beginning September 2025, with Windows Insider preview builds already reflecting this change as […]
The post Microsoft Removes PowerShell 2.0 From Windows To Clean Up Legacy Code appeared first on Cyber Security News.