Aggregator
CVE-2025-48957 | AstrBotDevs AstrBot up to 3.5.12 cmd_config.json path traversal
CVE-2025-29785 | quic-go 0.50.0 uncaught exception (ID 4981)
CVE-2025-47272 | CE-PhoenixCart prior 1.1.0.3 missing authentication (GHSA-62qj-pvwm-h8cv)
CISA Adds Five Known Exploited Vulnerabilities to Catalog
CISA added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2021-32030 ASUS Routers Improper Authentication Vulnerability
- CVE-2023-39780 ASUS RT-AX55 Routers OS Command Injection Vulnerability
- CVE-2024-56145 Craft CMS Code Injection Vulnerability
- CVE-2025-3935 ConnectWise ScreenConnect Improper Authentication Vulnerability
- CVE-2025-35939 Craft CMS External Control of Assumed-Immutable Web Parameter Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Please share your thoughts with us through our anonymous survey. We appreciate your feedback.
Securing APIs Protecting Backbone of Modern Applications
As modern applications increasingly depend on APIs to drive everything from mobile banking to healthcare systems, a growing security crisis is emerging across the digital landscape, highlighting the critical importance of securing APIs. New data reveals that API security incidents have more than doubled in just one year, with 37% of organizations reporting breaches in […]
The post Securing APIs Protecting Backbone of Modern Applications appeared first on Cyber Security News.
Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown
CVE-2025-48958 | Froxlor up to 2.2.5 cross site scripting
CVE-2025-3260 | Grafana up to 11.6.1 API dashboard.grafana.app authorization
CVE-2025-1750 | run-llama llama_index up to 0.3.0 DuckDBVectorStore delete ref_doc_id sql injection
CVE-2025-48990 | nekernel 0.0.2 Utils.cc heap-based overflow
CVE-2025-1246 | ARM Bifrost GPU Userspace Driver up to r49p3/r51p0 memory corruption
CVE-2009-2835 | Apple Mac OS X up to 10.3 input validation (Nessus ID 42434 / ID 116692)
CVE-2009-2836 | Apple Mac OS X up to 10.6.0 Password Authentication race condition (Nessus ID 42434 / ID 116692)
CVE-2009-2832 | Apple Mac OS X up to 10.4.9 memory corruption (Nessus ID 42434 / ID 116692)
CVE-2009-2833 | Apple Mac OS X 10.5.8 International Components for Unicode memory corruption (Nessus ID 42433 / ID 116692)
CVE-2009-2834 | Apple Mac OS X up to 10.3 Bluetooth access control (Nessus ID 42434 / ID 116692)
CVE-2009-2830 | Apple Mac OS X up to 10.6.0 memory corruption (Nessus ID 42434 / ID 116692)
CVE-2009-2831 | Apple Mac OS X 10.5.8 memory corruption (Nessus ID 42433 / ID 116692)
JGroup
You must login to view this content