Aggregator
CVE-2025-9505 | Campcodes Online Loan Management System 1.0 ajax.php?action=save_loan_type ID sql injection
CVE-2025-9506 | Campcodes Online Loan Management System 1.0 ajax.php?action=delete_plan ID sql injection
CVE-2025-9511 | itsourcecode Apartment Management System 1.0 /visitor/addvisitor.php ID sql injection
CVE-2025-9509 | itsourcecode Apartment Management System 1.0 fair_info_all.php fid sql injection
CVE-2025-9507 | itsourcecode Apartment Management System 1.0 /report/visitor_info.php vid sql injection
CVE-2025-9510 | itsourcecode Apartment Management System 1.0 /branch/addbranch.php ID sql injection
CVE-2025-9508 | itsourcecode Apartment Management System 1.0 /report/rented_info.php rsid sql injection
CVE-2025-9513 | editso fuso up to 1.0.4-beta.7 mod.rs PenetrateRsaAndAesHandshake priv_key inadequate encryption
CVE-2025-9514 | macrozheng mall up to 1.0.3 Registration weak password (Issue 923)
CVE-2025-57846 | Digital Arts i-フィルタ default permission
CVE-2025-48081 | Printeers Print & Ship Plugin up to 1.17.0 on WordPress path traversal
CVE-2025-57797 | PFU ScanSnap Manager Installer prior 6.5L61 privileges assignment
CVE-2025-49035 | Admin Menu Groups Plugin up to 0.1.2 on WordPress cross site scripting
CVE-2025-49040 | Backup Bolt Plugin up to 1.4.1 on WordPress cross-site request forgery
CVE-2025-49039 | Link View Plugin up to 0.8.0 on WordPress cross site scripting
Четыре заряда в одной молекуле и яркость как у Солнца. Учёные приблизились к созданию искусственного фотосинтеза
Qilin
You must login to view this content
CISA and Partners Release Joint Advisory on Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage Systems
CISA, along with the National Security Agency, Federal Bureau of Investigation, and international partners, released a joint Cybersecurity Advisory on People’s Republic of China (PRC) state-sponsored Advanced Persistent Threat (APT) actors targeting critical infrastructure across sectors and continents to maintain persistent, long-term access to networks.
This advisory builds on previous reporting and is based on real-world investigations conducted across multiple countries through July 2025. While the activity observed overlaps with industry reporting on the group known as Salt Typhoon, OPERATOR PANDA, RedMike, UNC5807, and GhostEmperor, among others, the advisory refers to them generically as APT actors to focus on the behavior, not the alias.
These APT actors are exploiting vulnerabilities in the large backbone routers of telecommunications providers—specifically provider edge and customer edge routers that often lack visibility and are difficult to monitor—to gain and maintain persistent access, particularly in telecommunications, government, transportation, lodging, and defense networks. They often modify router firmware and configurations to evade detection and establish long-term footholds.
CISA and authoring partners strongly urge network defenders, particularly those in high-risk sectors, to hunt for malicious activity and implement the mitigations outlined in this advisory.
For more detailed information, review the full advisory and CISA’s People’s Republic of China Cyber Threat Overview and Advisories web page.