FBI seizes multiple piracy sites for Nintendo Switch and PlayStation 4 games, dismantling their infrastructure. The FBI, with the help of the Dutch FIOD, seized multiple piracy sites distributing pirated video games, including nsw2u.com, ps4pkg.com, and mgnetu.com, dismantling their infrastructure. These sites, active for over four years, offered early access to popular game titles and […]
The North Korean threat actors linked to the Contagious Interview campaign have been observed publishing another set of 67 malicious packages to the npm registry, underscoring ongoing attempts to poison the open-source ecosystem via software supply chain attacks.
The packages, per Socket, have attracted more than 17,000 downloads, and incorporate a previously undocumented version of a malware
A vulnerability, which was classified as problematic, was found in Companion Auto Update Plugin up to 3.9.2 on WordPress. This affects an unknown part. The manipulation of the argument update_delay_days leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-4369. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Restrict File Access Plugin up to 1.1.2 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2025-7667. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in Caido up to 0.48.x. Affected by this vulnerability is an unknown functionality of the component Toast UI. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-53834. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Directus up to 11.8.x. Affected is an unknown function of the file /server/specs/oas of the component OpenAPI. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2025-53887. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Directus up to 11.8.x. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to improper authentication.
The identification of this vulnerability is CVE-2025-53889. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in dracoon up to 2.9.x. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-53839. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Directus up to 11.8.x. It has been classified as problematic. This affects an unknown part of the component WebHook Trigger Handler. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2025-53886. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.