Aggregator
Sherman Silverstein Data Leak, 5GB of Sensitive Client and Firm Information Allegedly Exposed
4 months 2 weeks ago
Sherman Silverstein Data Leak, 5GB of Sensitive Client and Firm Information Allegedly Exposed
Dark Web Informer
Frenchie Data Leak, 6,052 Customer Records Allegedly Exposed
4 months 2 weeks ago
Frenchie Data Leak, 6,052 Customer Records Allegedly Exposed
Dark Web Informer
Положили смартфон на стол? Поздравляем, он уже шепчет ваши тайны в уши ИИ — и тот их запомнит
4 months 2 weeks ago
Оказывается, телефоны могут выдать речь говорящего микровибрациями корпуса.
Home Office Phishing Scam Targets UK Immigration Sponsors
4 months 2 weeks ago
The sophisticated campaign aims to steal credentials of sponsor license holders to facilitate immigration fraud, extortion and other monetization schemes
Supply-chain dependencies: Check your resilience blind spot
4 months 2 weeks ago
Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?
CVE-2025-42976 | SAP NetWeaver Application Server ABAP up to SEM-BW 600 BIC Document out-of-bounds
4 months 2 weeks ago
A vulnerability was found in SAP NetWeaver Application Server ABAP up to SEM-BW 600. It has been declared as critical. This vulnerability affects unknown code of the component BIC Document. The manipulation leads to out-of-bounds read.
This vulnerability was named CVE-2025-42976. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2025-42975 | SAP NetWeaver Application Server ABAP up to SEM-BW 600 BIC Document cross site scripting
4 months 2 weeks ago
A vulnerability, which was classified as problematic, has been found in SAP NetWeaver Application Server ABAP up to SEM-BW 600. Affected by this issue is some unknown functionality of the component BIC Document. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-42975. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2025-42950 | SAP Landscape Transformation up to DMIS 2011_1_700 SLT code injection
4 months 2 weeks ago
A vulnerability was found in SAP Landscape Transformation up to DMIS 2011_1_700. It has been declared as critical. This vulnerability affects unknown code of the component SLT. The manipulation leads to code injection.
This vulnerability was named CVE-2025-42950. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2025-42951 | SAP Business One B1_ON_HANA 10.0/SAP-M-BO 10.0 SLD authorization
4 months 2 weeks ago
A vulnerability was found in SAP Business One B1_ON_HANA 10.0/SAP-M-BO 10.0. It has been rated as very critical. This issue affects some unknown processing of the component SLD. The manipulation leads to incorrect authorization.
The identification of this vulnerability is CVE-2025-42951. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2025-42955 | SAP Cloud Connector 2.0 Request authorization
4 months 2 weeks ago
A vulnerability classified as problematic was found in SAP Cloud Connector 2.0. Affected by this vulnerability is an unknown functionality of the component Request Handler. The manipulation leads to missing authorization.
This vulnerability is known as CVE-2025-42955. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2025-42957 | SAP S-4HANA 4CORE 102 up to 107 RFC code injection
4 months 2 weeks ago
A vulnerability, which was classified as critical, has been found in SAP S-4HANA 4CORE 102 up to 107. Affected by this issue is some unknown functionality of the component RFC. The manipulation leads to code injection.
This vulnerability is handled as CVE-2025-42957. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2025-5391 | WooCommerce Purchase Orders Plugin up to 1.0.2 on WordPress delete_file denial of service
4 months 2 weeks ago
A vulnerability has been found in WooCommerce Purchase Orders Plugin up to 1.0.2 on WordPress and classified as problematic. Affected by this vulnerability is the function delete_file. The manipulation leads to denial of service.
This vulnerability is known as CVE-2025-5391. The attack can be launched remotely. There is no exploit available.
vuldb.com
CVE-2025-8462 | RT Easy Builder Plugin up to 2.3 on WordPress URL Parameter social cross site scripting
4 months 2 weeks ago
A vulnerability was found in RT Easy Builder Plugin up to 2.3 on WordPress. It has been classified as problematic. This affects an unknown part of the component URL Parameter Handler. The manipulation of the argument social leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-8462. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2025-8568 | GMap Generator Plugin up to 1.1 on WordPress h cross site scripting
4 months 2 weeks ago
A vulnerability was found in GMap Generator Plugin up to 1.1 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation of the argument h leads to cross site scripting.
This vulnerability was named CVE-2025-8568. The attack can be initiated remotely. There is no exploit available.
vuldb.com
A New Security Threat to Public Clouds From Old Vulnerabilities
4 months 2 weeks ago
Researchers at the WHY2025 hacker forum said they were able to combine the Spectre and L1TF processor vulnerabilities discovered in 2018 to create a new transient execution attack called L1TF Reloaded that allowed them to leak data from AWS and Google Cloud instances.
The post A New Security Threat to Public Clouds From Old Vulnerabilities appeared first on Security Boulevard.
Jeffrey Burt
Introduction to cloud computing (ITSAP.50.110)
4 months 2 weeks ago
Canadian Centre for Cyber Security
How to Stay a Step Ahead of a Non-Obvious Threat
4 months 2 weeks ago
Securing business logic isn't just a technical requirement — it's a business imperative.
Dirk Schrader
Models of cloud computing (ITSAP.50.111)
4 months 2 weeks ago
Canadian Centre for Cyber Security
Introduction to cloud computing (ITSAP.50.110)
4 months 2 weeks ago
Canadian Centre for Cyber Security