Aggregator
CVE-2025-8896 | User Profile Builder Plugin up to 3.14.3 on WordPress GDPR Communication Preferences gdpr_communication_preferences cross site scripting (EUVD-2025-25075)
CVE-2025-8089 | Advanced iFrame Plugin up to 2025.6 on WordPress additional cross site scripting (EUVD-2025-25074)
CVE-2025-8464 | Drag and Drop Multiple File Upload for Contact Form 7 Plugin Cookie path traversal
CVE-2025-7499 | BetterDocs Plugin up to 4.1.1 on WordPress get_response authorization
CVE-2025-8719 | Translate This gTranslate Shortcode Plugin up to 1.0 on WordPress base_lang cross site scripting
CVE-2025-7867 | Portabilis i-Educar 2.9.0/2.10.0 Agenda /intranet/agenda.php novo_titulo/novo_descricao cross site scripting
CVE-2025-32463漏洞复现与分析
83% 的 Python 开发者仍然使用旧版本
上线通知|每月上线的京东卡来啦~
Kubernetes 集群环境的 20 多个威胁场景
CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks
CISA has issued a critical warning regarding a high-severity OS command injection vulnerability in Trend Micro Apex One Management Console that threat actors are actively exploiting in the wild. The vulnerability, tracked as CVE-2025-54948 and classified under CWE-78, poses significant risks to organizations running on-premise installations of the enterprise security platform. Key Takeaways1. CISA confirms […]
The post CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks appeared first on Cyber Security News.
Git 2.51: Preparing for the future with SHA-256
Git 2.51 is out, and the release continues the long process of modernizing the version control system. The update includes several technical changes, but one of the most important areas of work is Git’s move toward stronger cryptographic security through SHA-256 support. Git has relied on SHA-1 since its creation in 2005. SHA-1 has been showing its age for years, with researchers demonstrating collision attacks that make it unsuitable for long-term use. The community has … More →
The post Git 2.51: Preparing for the future with SHA-256 appeared first on Help Net Security.
PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks
还原漏洞调用链:CVE-2025-24813 Tomcat 反序列化漏洞源码深度解析(下篇)
«ИИ в браузере?» Firefox 142 добавил поддержку локальных языковых моделей
IoT Security
As the Internet of Things (IoT) continues to transform industries and daily lives, security has become one of the most critical challenges organizations face. From smart homes and connected cars to industrial systems and healthcare devices, IoT ecosystems are vast and deeply integrated into business operations and personal environments. However, with this rapid adoption comes
The post IoT Security appeared first on Seceon Inc.
The post IoT Security appeared first on Security Boulevard.
OWASP Security Misconfiguration: Quick guide
Security misconfiguration is a significant concern, in the OWASP Top 10. During our web application penetration tests, we often discover numerous vulnerabilities of this nature. According to OWASP, this issue impacts nearly 90% of all web applications. In this blog, we will explore this vulnerability through the lens of the OWASP Top 10, illustrating it […]
The post OWASP Security Misconfiguration: Quick guide appeared first on Kratikal Blogs.
The post OWASP Security Misconfiguration: Quick guide appeared first on Security Boulevard.