Aggregator
CVE-2025-0554 | Podlove Podcast Publisher Plugin up to 4.1.25 on WordPress Feed Name cross site scripting
CVE-2024-13515 | Image Source Control Lite Plugin up to 2.28.0 on WordPress cross site scripting
CVE-2025-0318 | Ultimate Member Plugin up to 2.9.1 on WordPress information disclosure
CVE-2025-0308 | Ultimate Member Plugin up to 2.9.1 on WordPress sql injection
CVE-2024-53683 | Ossur Mobile Logic Application up to 1.5.4 exposure of sensitive system information to an unauthorized control sphere (icsma-24-354-01)
CVE-2024-26157 | ETIC Telecom Remote Access Server RAS up to 4.4.x get view cross site scripting (icsa-22-307-01)
CVE-2024-26156 | ETIC Telecom Remote Access Server RAS up to 4.5.0 method cross site scripting (icsa-22-307-01)
CVE-2024-26153 | ETIC Telecom Remote Access Server RAS up to 4.9.18 cross-site request forgery (icsa-22-307-01)
CVE-2024-26154 | ETIC Telecom Remote Access Server RAS up to 4.4.x Web Server cross site scripting (icsa-22-307-01)
CVE-2024-45832 | Ossur Mobile Logic Application up to 1.5.4 hard-coded credentials (icsma-24-354-01)
CVE-2024-54681 | Ossur Mobile Logic Application up to 1.5.4 command injection (icsma-24-354-01)
CVE-2024-26155 | ETIC Telecom Remote Access Server RAS up to 4.4.x Web Portal cleartext transmission (icsa-22-307-01)
Cohesity Extends Services Reach to Incident Response Platforms
Cohesity has extended its Cyber Event Response Team (CERT) service to include third-party providers of incident response platforms, including Palo Alto Networks Unit 42, Arctic Wolf, Sophos, Fenix24 and Semperis.
The post Cohesity Extends Services Reach to Incident Response Platforms appeared first on Security Boulevard.
Cohesity Extends Services Reach to Incident Response Platforms
Unveiling 2024’s Attack Trends: Insights from Source Defense Research
by Source Defense In 2024, Magecart attacks reached new levels of sophistication, targeting thousands of e-commerce websites worldwide. At Source Defense Research, we tracked dozens of campaigns leveraging advanced techniques, from exploiting Google Tag Manager to innovative uses of WebSockets and payment form forgeries. These attacks highlight the adaptability of attackers in the face of
The post Unveiling 2024’s Attack Trends: Insights from Source Defense Research appeared first on Source Defense.
The post Unveiling 2024’s Attack Trends: Insights from Source Defense Research appeared first on Security Boulevard.