Aggregator
CVE-2025-22632 | totalsoft WooCommerce Pricing Plugin up to 1.0.9 on WordPress cross site scripting
CVE-2024-13822 | Photo Contest Plugin up to 2.8.1 on WordPress cross site scripting
CVE-2024-13605 | 10Web Form Maker Plugin up to 1.15.32 on WordPress Setting cross site scripting
CVE-2024-12308 | Logo Slider Plugin up to 4.5.x on WordPress Shortcode Attribute cross site scripting
CVE-2025-22633 | Matt Cromwell Give Plugin up to 2.0.0 on WordPress file information disclosure
CVE-2024-55898 | IBM i 7.2/7.3/7.4/7.5 uncontrolled search path
CVE-2024-51905 | Ravi & Suma RSV PDF Preview Plugin up to 1.0 on WordPress cross site scripting
CVE-2024-51904 | Joan Boluda Embed Documents Shortcode Plugin up to 1.5 on WordPress cross site scripting
CVE-2024-51906 | Rapid Sort RSV 360 View Plugin up to 1.0 on WordPress cross site scripting
CVE-2024-51907 | codemenschen WP Virtual Room Configurator Plugin up to 1.0.0 on WordPress cross site scripting
CVE-2024-51909 | Monarkie Digital Content Solutions audioCase Plugin up to 1.2.1 on WordPress cross site scripting
缅甸从电诈窝点解救 3000 名被困外国人
The Essential Guide to Horizon Scanning in Compliance and Regulatory Frameworks
In today’s fast-paced and interconnected world, compliance and regulatory frameworks are evolving faster than ever. The risk of falling behind on these changes can be severe. Enter horizon scanning—a concept that’s rapidly gaining traction in compliance and regulatory risk management. Horizon scanning is not a new concept. In fact, horizon scanning has been used for […]
The post The Essential Guide to Horizon Scanning in Compliance and Regulatory Frameworks appeared first on Centraleyes.
The post The Essential Guide to Horizon Scanning in Compliance and Regulatory Frameworks appeared first on Security Boulevard.
CVE-2025-1618 | vTiger CRM 6.4.0 index.php _operation cross site scripting
CVE-2025-1629 | Excitel Broadband Private my Excitel App 3.13.0 on Android One-Time Password excessive authentication
OpenAI 研究员发现最好的 AI 也无法解决大部分编程问题
CVE-2005-1807 | PHPMailer 1.72 class.smtp.php data infinite loop (EDB-25752 / BID-13805)
UniFi Protect Camera Vulnerability Allows Remote Code Execution Attacks
Ubiquiti Networks has issued an urgent security advisory addressing five critical vulnerabilities in its UniFi Protect camera ecosystem, including two flaws enabling unauthenticated remote code execution (RCE) attacks. The vulnerabilities, discovered during the 2025 Pwn2Own Toronto hacking competition and disclosed through Trend Micro’s Zero Day Initiative (ZDI), affect both camera firmware and the management application, […]
The post UniFi Protect Camera Vulnerability Allows Remote Code Execution Attacks appeared first on Cyber Security News.