Aggregator
CVE-2025-8151 | HT Mega Plugin up to 2.9.1 on WordPress CSS File save_block_css path traversal
CVE-2025-8068 | HT Mega Plugin up to 2.9.1 on WordPress ajax_trash_templates improper authorization
CVE-2025-8401 | HT Mega Plugin up to 2.9.1 on WordPress get_post_data information disclosure
ИИ сыграет главную роль, озвучит злодея и напишет саундтрек. А ты? Ты в титрах не нужен
加一个字母就可以绕过AI围栏,新的漏洞:TokenBreak
お知らせ:JPCERT/CC Eyes「Cobalt Strike Beaconの機能をクロスプラットフォームへと拡張するツール「CrossC2」を使った攻撃」
CVE-2008-5945 | Nukevietcms Nukeviet 2.0 improper authentication (EDB-32243 / XFDB-44457)
CVE-2008-0497 | CMS 3.31 action.php cross site scripting (EDB-31074 / BID-27492)
CVE-2008-1873 | Tru-zone Nukeet 3.2/3.4 mensaje cross site scripting (EDB-31609 / XFDB-41646)
CVE-2008-4179 | NooMS 1.1 smileys.php cross site scripting (EDB-32361 / XFDB-45074)
CVE-2008-5943 | NavBoard 16 admin_modules.php module path traversal (EDB-32246 / XFDB-44450)
CVE-2008-5944 | NavBoard 16 modules.php module cross site scripting (EDB-32245 / XFDB-44451)
CVE-2008-0559 | Nilsons Blogger up to 0.11 core.php thispost path traversal (EDB-31083 / BID-27559)
CVE-2008-6517 | Nick Jenkin NewsHOWLER 1.0.3 Beta sql injection (EDB-32271 / XFDB-44519)
Critical WordPress Plugin Vulnerability Puts 70,000+ Sites at Risk of Remote Code Execution
A severe security vulnerability has been discovered in a popular WordPress plugin used by over 70,000 websites worldwide, potentially exposing them to complete takeover by malicious actors. The vulnerability, tracked as CVE-2025-7384, affects the “Database for Contact Form 7, WPforms, Elementor forms” plugin and carries a critical CVSS score of 9.8 out of 10. Vulnerability […]
The post Critical WordPress Plugin Vulnerability Puts 70,000+ Sites at Risk of Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The top CTEM platforms you should know in 2025
Continuous Threat Exposure Management (CTEM) is a cybersecurity strategy originally coined by Gartner analysts, which focuses on identifying, prioritizing, validating, and mobilizing teams to reduce threat exposure across an organization’s full attack surface. It’s in a category of cybersecurity tools often considered as, “offensive security,” as the tools and processes related to CTEM deal with stopping attacks before they happen. Unlike traditional vulnerability management or threat detection, CTEM emphasizes continuous insight into how an attacker … More →
The post The top CTEM platforms you should know in 2025 appeared first on Help Net Security.