Aggregator
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2025-2783 Google Chromium Mojo Sandbox Escape Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
CISA Releases One Industrial Control Systems Advisory
CISA released one Industrial Control Systems (ICS) advisory on March 27, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
To Meet Compliance Challenges, Focus on Building Great Security
CVE-2024-36371 | JetBrains TeamCity prior 2023.05.5/2023.11.5 Commit Status Publisher cross site scripting
CVE-2024-36366 | JetBrains TeamCity prior 2022.04.6/2022.10.5/2023.05.5/2023.11.5 Report Group cross site scripting
CVE-2024-36363 | JetBrains TeamCity prior 2022.04.6/2022.10.5/2023.05.5/2023.11.5 Code Inspection Report cross site scripting
CVE-2024-36367 | JetBrains TeamCity prior 2022.04.6/2022.10.5/2023.05.5/2023.11.5 Third-Party Report cross site scripting
CVE-2024-36368 | JetBrains TeamCity prior 2022.04.6/2022.10.5/2023.05.5/2023.11.5 OAuth Provider Configuration cross site scripting
CVE-2024-36369 | JetBrains TeamCity prior 2022.04.6/2022.10.5/2023.05.5/2023.11.5 Issue Tracker Integration cross site scripting
CVE-2024-36370 | JetBrains TeamCity prior 2022.04.6/2022.10.5/2023.05.5/2023.11.5 OAuth Connection Setting cross site scripting
CVE-2024-36372 | JetBrains TeamCity up to 2023.05.4 Subscription Page cross site scripting
CVE-2024-36373 | JetBrains TeamCity up to 2024.03.1 Untrusted Builds Setting cross site scripting
CVE-2024-36374 | JetBrains TeamCity up to 2024.03.1 Build Step Setting cross site scripting
CVE-2024-31079 | F5 NGINX Plus/NGINX Open Source HTTP3 QUIC denial of service (K000139611)
CVE-2024-35200 | F5 NGINX Plus/NGINX Open Source HTTP3 QUIC denial of service (K000139612)
CVE-2024-32760 | F5 NGINX Plus/NGINX Open Source HTTP3 QUIC denial of service (K000139609)
CVE-2024-34161 | F5 NGINX Plus/NGINX Open Source HTTP3 QUIC memory leak (K000139627)
Сомнение — новая сила ИИ: Сколтех развивает осторожный интеллект
Threat Actors Using Powerful Cybercriminal Weapon ‘Atlantis AIO’ to Automate Credential Stuffing Attacks
Credential stuffing has emerged as one of the most pervasive and effective attack vectors in today’s cybersecurity landscape. This technique, which leverages stolen username and password combinations across multiple platforms, has been significantly enhanced through a sophisticated automation tool called Atlantis AIO (All-In-One), enabling threat actors to execute attacks at unprecedented scale and efficiency. The […]
The post Threat Actors Using Powerful Cybercriminal Weapon ‘Atlantis AIO’ to Automate Credential Stuffing Attacks appeared first on Cyber Security News.