Aggregator
印度严重的空气污染无意中起到了降温作用
CVE-2025-4659 | Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms Plugin information disclosure
CVE-2025-5259 | Minimal Share Buttons Plugin up to 1.7.3 on WordPress align cross site scripting
CVE-2025-48865 | Fabio up to 1.6.5 Header data authenticity
CVE-2025-46352 | Consilium Safety CS5000 Fire Panel VNC Server hard-coded credentials (icsa-25-148-03)
CVE-2025-5236 | NinjaTeam Chat for Telegram Plugin up to 1.1 on WordPress Username cross site scripting
CVE-2025-48491 | aryan6673 project-ai prior pre-beta API Key hard-coded credentials
CVE-2025-48490 | Lomkit laravel-rest-api up to 2.12.x improper authorization (GHSA-69rh-hccr-cxrj)
CVE-2025-4695 | PHPGurukul/Campcodes Cyber Cafe Management System 1.0 /add-users.php uadd sql injection (EUVD-2025-15153)
NightSpire
You must login to view this content
Safari Flaw Exploited by BitM Attack to Steal User Login Data
A new wave of phishing attacks, known as Fullscreen Browser-in-the-Middle (BitM) attacks, is exploiting browser features to steal user credentials with unprecedented stealth. Unlike traditional phishing, which relies on fake websites and visible clues, BitM attacks leverage remote browser sessions and the Fullscreen API to create convincing overlays that mask all browser interface elements, including […]
The post Safari Flaw Exploited by BitM Attack to Steal User Login Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
YouTube могут вернуть в Россию: названы условия
微软 OneDrive File Picker缺陷导致应用获取完整的云访问权限
苹果Safari 漏洞使用户易遭全屏中间浏览器攻击
Уроки литературы — ИИ пишет сочинения, уроки жизни — ломает детскую психику
Next.js Dev Server Vulnerability Leads to Developer Data Exposure
A recently disclosed vulnerability, CVE-2025-48068, has raised concerns among developers using the popular Next.js framework. This flaw, affecting versions 13.0.0 through 15.2.1 when the App Router is enabled, allows attackers to exploit the development server via Cross-site WebSocket Hijacking (CSWSH), potentially exposing sensitive application source code. The issue has been addressed in version 15.2.2, but […]
The post Next.js Dev Server Vulnerability Leads to Developer Data Exposure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.