Aggregator
CVE-2008-6631 | BlogPHP 2.0 index.php Username cross site scripting (EDB-31774 / XFDB-42370)
20,000 WordPress Sites at Risk of File Upload & Deletion Exploits
A critical security alert has been issued to WordPress site administrators following the discovery of two high-severity vulnerabilities in the “WP Ultimate CSV Importer” plugin. With over 20,000 active installations, the plugin’s flaws pose a significant risk to affected websites, potentially leading to complete site takeovers by attackers. CVE Identified: File Upload and Deletion Exploits […]
The post 20,000 WordPress Sites at Risk of File Upload & Deletion Exploits appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Prince Ransomware – An Automated Open-Source Ransomware Builder Freely Available on GitHub
The cybersecurity landscape has witnessed a concerning development with the emergence of “Prince Ransomware,” an open-source ransomware builder that was freely accessible on GitHub until recently. This tool, written in the Go programming language, has been exploited by cybercriminals to launch sophisticated ransomware attacks with minimal technical expertise. The recent attack on Mackay Memorial Hospital […]
The post Prince Ransomware – An Automated Open-Source Ransomware Builder Freely Available on GitHub appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
QR Code Phishing (Quishing) Attack Your Smartphones To Steal Microsoft Accounts Credentials
Cybersecurity researchers have identified a growing trend in phishing attacks leveraging QR codes, a tactic known as “quishing.” These attacks exploit the widespread use of smartphones to deceive users into exposing sensitive credentials, particularly targeting Microsoft accounts. According to recent findings, attackers are embedding malicious URLs within QR codes to bypass traditional security measures and […]
The post QR Code Phishing (Quishing) Attack Your Smartphones To Steal Microsoft Accounts Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2021-32292 | json-c up to 0.15-20200726 json_parse.c parseit stack-based overflow (Issue 654)
CVE-2025-3097 | Time Machine Plugin up to 3.4.0 on WordPress Setting wpTimeMachineCore.php cross-site request forgery
CVE-2024-13637 | Theme4Press Demo Awesome Plugin up to 1.0.3 on WordPress Activation install_plugin authorization
CVE-2025-3063 | Shopper Approved Reviews Plugin 2.0/2.1 on WordPress ajax_callback_update_sa_option authorization
CVE-2025-3098 | Video Url Plugin up to 1.0.0.3 on WordPress ID cross site scripting
CVE-2025-2513 | Smart Icons for Plugin up to 1.0.4 on WordPress SVG File Upload cross site scripting
CVE-2025-2483 | Gift Certificate Creator Plugin up to 1.1.0 on WordPress receip_address cross site scripting
CVE-2025-3099 | Advanced Search by My Solr Server Plugin up to 2.0.5 on WordPress Setting cross-site request forgery
CVEs lose relevance: Get proactive — and think beyond vulnerabilities
Application security (AppSec) would not have existed for the past 25 years without the Common Vulnerabilities and Exposures (CVEs), the numbering system used for identifying discovered vulnerabilities in software. After the creation and adoption of the system in 1999, major companies such as Microsoft quickly began contributing CVE discoveries, using the Common Vulnerability Scoring System (CVSS) to convey the severity of a flaw.
The post CVEs lose relevance: Get proactive — and think beyond vulnerabilities appeared first on Security Boulevard.