Aggregator
CVE-2024-48191 | dingfanzu CMS 1.0 doAdminAction.php?act=delAdmin&id=17 cross-site request forgery
CVE-2024-48291 | dingfanzu CMS 1.0 doAdminAction.php?act=editAdmin&id=17 cross-site request forgery
CVE-2025-30849 | g5theme Essential Real Estate Plugin up to 5.2.0 on WordPress filename control
CVE-2025-30870 | WP Travel Engine Plugin up to 6.3.5 on WordPress filename control
CVE-2025-3045 | oretnom23/SourceCodester Apartment Visitor Management System 1.0 /remove-apartment.php ID sql injection
CVE-2024-13553 | WooCommerce SMS Alert Order Notifications Plugin up to 3.7.9 on WordPress improper authentication
CVE-2025-26369 | Nozomi Q-Free MaxTime up to 2.11.0 HTTP routes.lua authorization
CVE-2024-42835 | langflow 1.0.12 PythonCodeTool privilege escalation
CVE-2024-47378 | WPCOM Member Plugin up to 1.5.4 on WordPress cross site scripting
Hottest cybersecurity open-source tools of the month: May 2025
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Vuls: Open-source agentless vulnerability scanner Vuls is an open-source tool that helps users find and manage security vulnerabilities. It was created to solve the daily problems admins face when trying to keep servers secure. LlamaFirewall: Open-source framework to detect and mitigate AI centric security risks LlamaFirewall is a system-level security framework for LLM-powered applications, built with a … More →
The post Hottest cybersecurity open-source tools of the month: May 2025 appeared first on Help Net Security.
Salt Typhoon Believed to Be Behind Commvault Data Breach
A suspected Chinese state hacking group linked to last year’s telecom intrusions breached Commvault’s Microsoft Azure environment, exposing sensitive Microsoft 365 credentials and reigniting fears over U.S. cloud infrastructure vulnerabilities and default security settings.
Check Point Buys Startup Veriti to Advance Threat Management
Check Point will fold Israeli firm Veriti into its Quantum suite following an acquisition aimed at streamlining automated security response across endpoints, firewalls and cloud environments. Veriti’s patented technology is seen as critical to reducing misconfigurations without business disruption.
RobbinHood Ransomware Hacker Pleads Guilty in US Court
An Iranian national behind a spate of ransomware attacks against U.S. municipalities including an attack that cost the city of Baltimore $19 million to rectify pleaded guilty in U.S. federal court Tuesday afternoon. Sina Gholinejad, 37, admitted to deploying Robinhood ransomware.
Patched GitLab Duo Flaws Risked Code Leak, Malicious Content
Hackers can exploit vulnerabilities in a generative artificial intelligence assistant integrated across GitLab's DevSecOps platform to manipulate the model's output, exfiltrate source code and potentially deliver malicious content through the platform's user interface.
NPM索引上有数十个恶意软件包正在收集主机和网络数据
最新发现,安全研究人员在NPM索引中发现了60个试图收集敏感主机和网络数据并将其发送到由威胁者控制的Discord webhook的软件包。
根据Socket威胁研究团队的说法,这些软件包从5月12日开始从三个发布者账户上传到NPM存储库。
每个恶意包都包含一个安装后脚本,在‘ npm install ’期间自动执行,并收集以下信息:
·主机名
·内部IP地址
·用户主目录
·当前工作目录
·用户名
·系统DNS服务器
该脚本检查与云提供商相关的主机名,反向DNS字符串,试图确定它是否在分析环境中运行。
Socket没有观察到第二阶段有效负载的交付、特权升级或任何持久机制。然而,鉴于所收集的数据类型,针对性网络攻击的危险是显著的。
NPM 上仍有可用的软件包
研究人员报告了这些恶意软件包,根据调查,它们在NPM上仍然可用,并且显示累计下载计数为3000。但不久后,存储库中没有一个是存在的。
为了诱骗开发人员使用它们,恶意分子使用了与索引中合法包相似的名称,如“flipper-plugins”、“react-xterm2”和“hermes-inspector- msgen”,这些通用的信任唤起名称,以及其他暗示测试的名称,可能针对CI/CD管道。
如果用户已经安装了它们中的任何一个,建议立即删除它们并执行完整的系统扫描以消除任何感染残余。
NPM上的数据擦除工具
Socket本周在NPM上发现的另一个恶意活动涉及8个恶意软件包,它们通过输入错误模仿合法工具,但可以删除文件、破坏数据和关闭系统。
这些包主要针对React、Vue.js、Vite、Node.js和Quill生态系统,在过去两年里一直存在于NPM上,获得了6200次下载。
避免这种情况在很大程度上是由于载荷是根据硬编码的系统日期激活的,并且它们被设计成逐步破坏框架文件、损坏核心JavaScript方法和破坏浏览器存储机制。
脚本用于2023年6月19日至30日删除vue .js相关文件
恶意分子在发布这些恶意软件时还列出了几个合法的软件包,以建立信任并逃避检测。尽管根据硬编码的日期,虽然危险已经过去了,但删除这些软件包同样至关重要,因为它们的作者可能会引入更新,这些更新将在未来重新触发它们的擦除功能。