Aggregator
CVE-2025-8524 | Boquan DotWallet App 2.15.2 on Android com.boquanhash.dotwallet AndroidManifest.xml improper export of android application components
CVE-2025-8523 | RiderLike Fruit Crush-Brain App 1.0 on Android com.fruitcrush.fun AndroidManifest.xml improper export of android application components
Submit #619037: Boquan DotWallet(com.boquanhash.dotwallet) 2.15.2 Task Hijacking [Accepted]
Critical Squid Flaw Allows Remote Code Execution by Attackers
A severe security vulnerability in the widely-used Squid HTTP proxy has been disclosed, potentially exposing millions of systems to remote code execution attacks. The flaw, designated as CVE-2025-54574 and SQUID-2025:1, represents a critical buffer overflow vulnerability in the software’s URN handling mechanism that could allow attackers to execute arbitrary code on affected systems. Vulnerability Details […]
The post Critical Squid Flaw Allows Remote Code Execution by Attackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Submit #619035: RiderLike Fruit Crush-Brain 1.0.0 Task Hijacking [Accepted]
CVE-2025-8522 | givanz Vvvebjs up to 2.0.4 node.js /save.php File path traversal (Issue 409)
CVE-2025-8521 | givanz Vvveb up to 1.0.5 Add Type post-types cross site scripting
CVE-2025-8520 | givanz Vvveb up to 1.0.5 Drag-and-Drop Editor editor url server-side request forgery
CVE-2025-8519 | givanz Vvveb up to 1.0.5 Drag-and-Drop Editor editor url information disclosure
CVE-2025-8518 | givanz Vvveb 1.0.5 Code Editor code.php save code injection
CVE-2025-8517 | givanz Vvveb 1.0.6.1 session fixiation (Issue 312)
Submit #616993: givanz Vvvebjs 2.0.4 Directory Traversal (Arbitrary File Write) [Accepted]
Submit #625003: Vvveb 1.0.5 Cross Site Scripting [Accepted]
Submit #624973: Vvveb 1.0.5 Server-Side Request Forgery [Accepted]
Submit #624972: Vvveb 1.0.5 Internal File Read [Accepted]
Submit #624971: Vvveb 1.0.5 Privilege Escalation to RCE [Accepted]
Submit #623135: Vvveb Vvveb CMS 1.0.6.1 Session Fixiation [Accepted]
Interlock Ransomware Employs ClickFix Technique to Run Malicious Commands on Windows Machines
The cybersecurity landscape continues to evolve as threat actors develop increasingly sophisticated methods to compromise Windows systems. A new ransomware variant known as Interlock has emerged as a significant threat, leveraging the deceptive ClickFix social engineering technique to execute malicious commands on victim machines. This malware represents a concerning evolution in ransomware deployment tactics, combining […]
The post Interlock Ransomware Employs ClickFix Technique to Run Malicious Commands on Windows Machines appeared first on Cyber Security News.