Aggregator
快手的 2025:一个 4 亿人社区的新陈代谢,与 2600 万人的变现之路
Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed
A critical zero-day vulnerability in Citrix NetScaler products, identified as CVE-2025-6543, has been actively exploited by threat actors since at least May 2025, months before a patch was made available. While Citrix initially downplayed the flaw as a “memory overflow vulnerability leading to unintended control flow and Denial of Service,” it has since been revealed […]
The post Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed appeared first on Cyber Security News.
CVE-2025-9719 | O2OA up to 10.0-410 Personal Profile Page script name/alias/description/applicationName cross site scripting (Issue 185)
CVE-2025-9718 | O2OA up to 10.0-410 Personal Profile Page process name/alias cross site scripting (Issue 184 / EUVD-2025-26286)
CVE-2025-9717 | O2OA up to 10.0-410 Personal Profile Page unit cross site scripting (Issue 183 / EUVD-2025-26284)
CVE-2025-9716 | O2OA up to 10.0-410 Personal Profile Page form name/alias/description cross site scripting (Issue 182 / EUVD-2025-26285)
CVE-2025-9715 | O2OA up to 10.0-410 Personal Profile Page script name/alias/description cross site scripting (Issue 181)
Submit #637247: o2oa ≤ 10.0-410-g3d5e0d2 XSS [Accepted]
Submit #637246: o2oa ≤ 10.0-410-g3d5e0d2 XSS [Accepted]
Submit #637245: o2oa ≤ 10.0-410-g3d5e0d2 XSS [Accepted]
Submit #637244: o2oa ≤ 10.0-410-g3d5e0d2 XSS [Accepted]
Submit #637243: o2oa ≤ 10.0-410-g3d5e0d2 XSS [Accepted]
iPhone без RuStore теперь «товар с дефектом». Как новый закон превратил все смартфоны Apple в России в бракованную технику
CVE-2025-38677 | Linux Kernel up to 6.16.3 f2fs_get_dnode_of_data out-of-bounds
【安全圈】FreePBX零日漏洞遭利用,官方通告:请立即锁定管理员访问
【安全圈】新型AI攻击借助图像植入恶意提示词窃取用户数据
【安全圈】当心!你的身份证照片可能被AI生成了动态视频
Any way to get invited to expl0it[dot]in site
New ‘Sindoor Dropper’ Malware Targets Linux Systems with Weaponized .desktop Files
A new malware campaign, dubbed “Sindoor Dropper,” is targeting Linux systems using sophisticated spear-phishing techniques and a multi-stage infection chain. The campaign leverages lures themed around the recent India-Pakistan conflict, known as Operation Sindoor, to entice victims into executing malicious files. This activity’s standout feature is its reliance on weaponized .desktop files, a method previously […]
The post New ‘Sindoor Dropper’ Malware Targets Linux Systems with Weaponized .desktop Files appeared first on Cyber Security News.