Aggregator
CVE-2025-0843 | needyamin Library Card System 1.0 Admin Panel admindashboard.php email/password sql injection
CVE-2025-0842 | needyamin Library Card System 1.0 Login admin.php email/password sql injection
Submit #485558: Needyamin Library-Card-System 1.0 Stored Cross Site Scripting [Accepted]
Submit #485553: Needyamin Library-Card-System 1.0 Broken Access Control [Accepted]
Submit #485540: needyamin Library-Card-System 1.0 SQL Injection [Accepted]
Re @anna_p_neumann @c_lindner Die FDP hat doch jahrelang genau solche Anträge, die von der AfD mit fast gleichen Inhalt verfasst waren, abgelehnt und...
CVE-2025-0841 | Aridius XYZ up to 20240927 on OpenCart News loadMore deserialization
Windows 11 24H2 Update Breaks Web camera, Audio, & USB
The most recent update for Windows 11 24H2, identified as KB5050009, has caused various kinds of technical issues for users, affecting critical functionalities like audio, Bluetooth, USB devices, and webcams. Released earlier this month, the update was intended to enhance system stability and introduce new features but has instead left many users grappling with broken […]
The post Windows 11 24H2 Update Breaks Web camera, Audio, & USB appeared first on Cyber Security News.
Maryland healthcare network forced to shut down IT systems after ransomware attack
Submit #485445: Aridius OpenCart modules ? Deserialization [Accepted]
CVE-2025-0840 | GNU Binutils up to 2.43 binutils/objdump.c disassemble_bytes buf stack-based overflow
Submit #485255: GNU binutils/objdump 2.43 Buffer Overflow [Accepted]
State-sponsored Actors Abusing Gemini to Fuel Cyber Attacks
The state-sponsored threat actors are increasingly exploiting Google’s AI-powered assistant, Gemini, to enhance their cyber operations. While generative AI tools like Gemini hold immense potential for innovation and productivity, their misuse by advanced persistent threat (APT) groups and information operations (IO) actors underscores the dual-use nature of such technologies. Google’s Threat Intelligence Group (GTIG) has […]
The post State-sponsored Actors Abusing Gemini to Fuel Cyber Attacks appeared first on Cyber Security News.
CVE-2025-24528 | MIT Kerberos 5 1.7 Incremental Propagation kadmind memory corruption
BCFE / Digital Forensics Career Entry Question
Joint guidance on content credentials and strengthening multimedia integrity in the generative artificial intelligence era
Managing Apple Intelligence features on macOS Sequoia 15.3
So basically I want to learn how to hack into my old social media where do I start
Apple Chips Vulnerability Exposes Credit Cards & Location History to Hackers
Researchers have uncovered two critical vulnerabilities in Apple’s custom silicon chips, dubbed SLAP (Speculative Load Address Prediction) and FLOP (False Load Output Predictions). These flaws, found in Apple’s A- and M-series processors, expose sensitive user data such as credit card details, location history, and even private email content to potential attackers. The vulnerabilities affect a […]
The post Apple Chips Vulnerability Exposes Credit Cards & Location History to Hackers appeared first on Cyber Security News.