Aggregator
CVE-2025-9151 | LiuYuYang01 ThriveX-Blog up to 3.1.7 web updateJsonValueByName improper authorization
Phrack是座丰碑
CVE-2025-9150 | Surbowl dormitory-management-php up to 9f1d9d1f528cabffc66fda3652c56ff327fda317 violation_add.php?id=2 ID sql injection
Submit #629873: LiuYuYang01 https://github.com/LiuYuYang01/ThriveX-Blog <=3.1.7 Incorrect Authorization [Accepted]
CVE-2025-9149 | Wavlink WL-NU516U1 M16U1_V240425 /cgi-bin/wireless.cgi sub_4032E4 Guest_ssid command injection
Submit #629618: github.com dormitory-management-php V1.0 SQL Injection [Accepted]
Submit #629181: Wavlink WL-NU516U1-A M16U1_V240425 Buffer Overflow [Accepted]
CVE-2025-9148 | CodePhiliaX Chat2DB up to 0.3.7 JDBC Connection DataSourceController.java sql injection
PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware
A sophisticated malware campaign has been identified, utilizing PipeMagic, a highly modular backdoor deployed by the financially motivated threat actor Storm-2460. This advanced malware masquerades as a legitimate open-source ChatGPT Desktop Application while exploiting the zero-day vulnerability CVE-2025-29824 in Windows Common Log File System (CLFS) to deploy ransomware across multiple sectors globally. Key Takeaways1. PipeMagic […]
The post PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware appeared first on Cyber Security News.
Submit #628912: CodePhiliaX Chat2DB 0.3.7 JDBC Connection Remote Code Execution [Accepted]
基因改变果蝇的求爱方式
CVE-2025-9147 | jasonclark getsemantic up to 040c96eb8cf9947488bd01b8de99b607b0519f7d /index.php view cross site scripting
印尼军事扩张与普拉博沃军改对我利益的系统影响分析
模因战争,一种新型认知战武器
SSH Keys Are Crucial for Secure Remote Access but Often Remain a Blind Spot in Enterprise Security
Enterprise security strategies have evolved dramatically to address modern threats, yet SSH keys—critical cryptographic credentials that provide direct access to mission-critical systems—remain largely ungoverned and poorly managed across organizations. Despite their fundamental role in securing remote access to servers, cloud infrastructure, and automated processes, SSH keys represent one of the most significant blind spots in […]
The post SSH Keys Are Crucial for Secure Remote Access but Often Remain a Blind Spot in Enterprise Security appeared first on Cyber Security News.