Aggregator
CVE-2024-53015 | Qualcomm Snapdragon Auto up to WSA8845H ioctl Command use after free (EUVD-2024-54638)
CVE-2024-53016 | Qualcomm Snapdragon Compute FastConnect 6800 up to WSA8832 Camera Driver toctou (EUVD-2024-54637)
CVE-2024-53017 | Qualcomm Snapdragon Wearables SDM429W/WCN3620/WCN3660B ioctl Command out-of-range pointer offset (EUVD-2024-54636)
CVE-2024-53018 | Qualcomm Snapdragon Compute FastConnect 6900 up to WSA8832 OIS Packet Parser toctou (EUVD-2024-54635)
CVE-2025-5150 | docarray up to 0.40.1 Web API torch_dataset.py __getitem__ prototype pollution
CVE-2025-5151 | defog-ai introspect up to 0.1.4 analysis_tools.py execute_analysis_code_safely code code injection (Issue 495 / ID 502)
CVE-2025-5152 | Chanjet CRM up to 20250510 gblOrgID sql injection
CVE-2025-5153 | CMS Made Simple 2.2.21 Design Manager Module Description cross site scripting
CVE-2025-32815 | Infoblox NETMRI up to 7.6.0 hard-coded credentials (EUVD-2025-16152)
Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for Non-Human Identities
Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for Non-Human Identities
Silver Spring, Maryland, 3rd June 2025, CyberNewsWire
The post Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for Non-Human Identities appeared first on Security Boulevard.
#Infosec2025: Demand More of Your Vendors to Ease Quantum Transition, Say Experts
CVE-2023-43208 | NextGen Healthcare Mirth Connect up to 4.4.0 on CVE os command injection
CVE-2008-3380 | MyioSoft EasyBookMarker 4.0 ajaxp_backend.php rs cross site scripting (EDB-32087 / XFDB-43918)
Victoria’s Secret delays earnings release after security incident
AttackIQ Ready3 identifies which vulnerabilities are truly exposed
AttackIQ releaseed AttackIQ Ready3. With expanded discovery capabilities, Ready3 maps both internal and external attack surfaces. By correlating asset discovery with vulnerability context, attack paths and compensating controls, the platform helps security teams identify which vulnerabilities are truly exposed because existing defenses are failing to stop them. The context enables teams to prioritize what’s actually reachable by adversaries and validate whether their security controls can stand up to real-world attacks. This release marks AttackIQ’s completed … More →
The post AttackIQ Ready3 identifies which vulnerabilities are truly exposed appeared first on Help Net Security.
Apple iOS Activation Flaw Enables Injection of Unauthenticated XML Payloads
A severe vulnerability in Apple’s iOS activation infrastructure has been uncovered, posing a significant risk to device security during the setup phase. This flaw, identified in the iOS Activation Backend at the endpoint https://humb.apple.com/humbug/baa, allows attackers to inject unauthenticated XML .plist payloads without any form of sender verification or signature validation. Tested on the latest […]
The post Apple iOS Activation Flaw Enables Injection of Unauthenticated XML Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.