Aggregator
CISA Adds Five Known Exploited Vulnerabilities to Catalog
CISA added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2021-32030 ASUS Routers Improper Authentication Vulnerability
- CVE-2023-39780 ASUS RT-AX55 Routers OS Command Injection Vulnerability
- CVE-2024-56145 Craft CMS Code Injection Vulnerability
- CVE-2025-3935 ConnectWise ScreenConnect Improper Authentication Vulnerability
- CVE-2025-35939 Craft CMS External Control of Assumed-Immutable Web Parameter Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Please share your thoughts with us through our anonymous survey. We appreciate your feedback.
Securing APIs Protecting Backbone of Modern Applications
As modern applications increasingly depend on APIs to drive everything from mobile banking to healthcare systems, a growing security crisis is emerging across the digital landscape, highlighting the critical importance of securing APIs. New data reveals that API security incidents have more than doubled in just one year, with 37% of organizations reporting breaches in […]
The post Securing APIs Protecting Backbone of Modern Applications appeared first on Cyber Security News.
Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown
CVE-2025-48958 | Froxlor up to 2.2.5 cross site scripting
CVE-2025-3260 | Grafana up to 11.6.1 API dashboard.grafana.app authorization
CVE-2025-1750 | run-llama llama_index up to 0.3.0 DuckDBVectorStore delete ref_doc_id sql injection
CVE-2025-48990 | nekernel 0.0.2 Utils.cc heap-based overflow
CVE-2025-1246 | ARM Bifrost GPU Userspace Driver up to r49p3/r51p0 memory corruption
CVE-2009-2835 | Apple Mac OS X up to 10.3 input validation (Nessus ID 42434 / ID 116692)
CVE-2009-2836 | Apple Mac OS X up to 10.6.0 Password Authentication race condition (Nessus ID 42434 / ID 116692)
CVE-2009-2832 | Apple Mac OS X up to 10.4.9 memory corruption (Nessus ID 42434 / ID 116692)
CVE-2009-2833 | Apple Mac OS X 10.5.8 International Components for Unicode memory corruption (Nessus ID 42433 / ID 116692)
CVE-2009-2834 | Apple Mac OS X up to 10.3 Bluetooth access control (Nessus ID 42434 / ID 116692)
CVE-2009-2830 | Apple Mac OS X up to 10.6.0 memory corruption (Nessus ID 42434 / ID 116692)
CVE-2009-2831 | Apple Mac OS X 10.5.8 memory corruption (Nessus ID 42433 / ID 116692)
JGroup
You must login to view this content
CVE-2015-5465 | Silicon Integrated Systems WindowsXP Display Manager 6.14.10.3930 IOCTL Call 0x96002400/0x96002404 write-what-where condition (ID 133399 / EDB-38054)
New Study Uncovers Vulnerable Code Pattern Exposes GitHub Projects To Path Traversal Attacks
A comprehensive security research study has revealed a widespread vulnerable code pattern affecting thousands of open-source projects on GitHub, exposing them to critical path traversal attacks that could allow malicious actors to access sensitive files and crash server systems. The vulnerability, classified as CWE-22, enables attackers to bypass intended directory restrictions and access files outside […]
The post New Study Uncovers Vulnerable Code Pattern Exposes GitHub Projects To Path Traversal Attacks appeared first on Cyber Security News.