Aggregator
CVE-2025-2940 | Ninja Tables Plugin up to 5.0.18 on WordPress server-side request forgery
CVE-2025-5398 | Ninja Forms Plugin up to 3.10.2.1 on WordPress cross site scripting
CVE-2025-6761 | Kingdee Cloud-Starry-Sky Enterprise Edition 6.x/7.x/8.x/9.0 Freemarker Engine DynamicForm 4 Action.class plugin.buildMobilePopHtml special elements used in a template engine (KDPSIRT-2025-00090)
CVE-2023-25998 | snstheme Samex Plugin up to 2.6 on WordPress filename control
CVE-2025-24769 | BZOTheme Zenny Plugin up to 1.7.5 on WordPress filename control (EUVD-2025-19260)
CVE-2025-24760 | goalthemes Sofass Plugin up to 1.3.4 on WordPress filename control
CVE-2025-23967 | wpopal GG Bought Together for WooCommerce Plugin up to 1.0.2 on WordPress sql injection
CVE-2025-24765 | RobMarsh Image Shadow Plugin up to 1.1.0 on WordPress path traversal (EUVD-2025-19259)
CVE-2025-24774 | mojoomla WPCRM Plugin up to 3.2.0 on WordPress cross site scripting (EUVD-2025-19261)
CVE-2025-25171 | ThemesGrove WP SmartPay Plugin up to 2.7.13 on WordPress authentication bypass (EUVD-2025-19262)
CVE-2014-4741 | Artifectx xClassified 1.2 catid sql injection (ID 127370 / EDB-39239)
Resupply Crypto Exploit: $10M Debt Hole Created Via Smart Contract Logic Flaw
The cryptocurrency project Resupply has found itself at the epicenter of a cyber incident following a sophisticated exploit that enabled an attacker to engineer a debt hole totaling 10 million reUSD. The breach affected...
The post Resupply Crypto Exploit: $10M Debt Hole Created Via Smart Contract Logic Flaw appeared first on Penetration Testing Tools.
Cybersecurity jobs available right now: July 1, 2025
Application Security Engineer Fireblocks | Israel | Hybrid – View job details As an Application Security Engineer, you will improve and secure the company’s continuous integration and deployment pipelines through CI/CD security hardening. You will operate, fine-tune, and customize security tooling such as Snyk, Apiiro, and other application security platforms to reduce false positives and enhance threat detection. Application Security Engineer Cambridge University Press & Assessment | Philippines | On-site – View job details As … More →
The post Cybersecurity jobs available right now: July 1, 2025 appeared first on Help Net Security.
Abusing Chrome Remote Desktop on Red Team Operations: A Practical Guide
FBI Warns: Scattered Spider Unleashes Social Engineering & Ransomware on Aviation Sector
The United States Federal Bureau of Investigation has issued an official warning regarding the escalating operations of the hacker collective known as Scattered Spider, which has now begun actively targeting the aviation sector. According...
The post FBI Warns: Scattered Spider Unleashes Social Engineering & Ransomware on Aviation Sector appeared first on Penetration Testing Tools.
Arctic Wolf Exposes “GIFTEDCROOK”: China-Linked APT Launches Evolving Cyber-Espionage on Ukraine Military
The hacker group UAC-0226 continues to aggressively evolve its malicious tool GIFTEDCROOK, which initially functioned as a browser data-stealing utility but has now acquired advanced capabilities, enabling the targeted exfiltration of confidential documents and...
The post Arctic Wolf Exposes “GIFTEDCROOK”: China-Linked APT Launches Evolving Cyber-Espionage on Ukraine Military appeared first on Penetration Testing Tools.