Aggregator
Kentico Xperience CMS Vulnerability Enables Remote Code Execution
In recent security research, vulnerabilities in the Kentico Xperience CMS have come to light, highlighting significant risks for users who rely on this Content Management System (CMS). Specifically, two primary issues were identified: an Authentication Bypass vulnerability and a Post-Authentication Remote Code Execution (RCE) vulnerability. These vulnerabilities, collectively forming a powerful exploit chain, allow attackers to gain full control […]
The post Kentico Xperience CMS Vulnerability Enables Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Critical RCE flaw in Apache Tomcat actively exploited in attacks
CVE-2025-2378 | PHPGurukul Medical Card Generation System 1.0 download-medical-cards.php searchdata sql injection
Red Hat security advisory (AV25-144)
Wazuh SIEM Vulnerability Enables Remote Malicious Code Execution
A critical vulnerability, identified as CVE-2025-24016, has been discovered in the Wazuh Security Information and Event Management (SIEM) platform. This vulnerability affects versions 4.4.0 to 4.9.0 and allows attackers with API access to execute arbitrary Python code remotely, potentially leading to complete system compromise. The flaw stems from the unsafe deserialization of Distributed API (DAPI) […]
The post Wazuh SIEM Vulnerability Enables Remote Malicious Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-2401 | Immunity Debugger 1.85 memory corruption
New Akira Ransomware Decryptor Leans on Nvidia GPU Power
A software programmer developed a way to use brute force to break the encryption of the notorious Akira ransomware using GPU compute power and enabling some victims of the Linux-focused variant of the malware to regain their encrypted data without having to pay a ransom.
The post New Akira Ransomware Decryptor Leans on Nvidia GPU Power appeared first on Security Boulevard.
IBM security advisory (AV25-143)
Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year
CVE-2024-37944 | WP Travel Engine Plugin up to 5.9.1 on WordPress cross site scripting
CVE-2024-37958 | Meks Smart Author Widget Plugin up to 1.1.4 on WordPress cross site scripting
CVE-2024-37960 | Chris Coyier CodePen Embedded Pens Shortcode Plugin up to 1.0.0 on WordPress cross site scripting
CVE-2024-37961 | codoc Plugin up to 0.9.51.12 on WordPress cross site scripting
CVE-2024-38670 | WP Darko Team Members Plugin up to 5.3.3 on WordPress cross site scripting
CVE-2024-37565 | TemeGUM Gum Elementor Addon Plugin up to 1.3.5 on WordPress cross site scripting
CVE-2024-37919 | Pratik Chaskar Timeline Module for Beaver Builder Plugin up to 1.1.3 on WordPress cross site scripting
CVE-2024-38673 | Obtain Infotech Multisite Content Copier Updater Plugin up to 1.5.0 on WordPress cross site scripting
Два терабайта наживы: злоумышленники атаковали торговую империю Alibaba
More From Our Main Blog: PinnacleOne ExecBrief | The Hidden Cyber Risks of Mergers & Acquisitions
This ExecBrief helps organizations understand and address the various cyber risks that can stem from mergers and acquisitions.
The post PinnacleOne ExecBrief | The Hidden Cyber Risks of Mergers & Acquisitions appeared first on SentinelOne.