Aggregator
CVE-2024-5769 | surakrai MIMO WooCommerce Order Tracking Plugin up to 1.0.2 on WordPress authorization
В России принята концепция борьбы с преступлениями в цифровой среде
CVE-2024-12848 | sonalsinha21 SKT Page Builder Plugin up to 4.7 on WordPress addLibraryByArchive authorization
CVE-2024-12330 | Database Backup Plugin up to 7.3 on WordPress backup
CVE-2024-6155 | wpsoul Greenshift Plugin up to 9.0.0 on WordPress greenshift_download_file_localy authorization
CVE-2024-12605 | opacewebdesign AI Scribe Plugin up to 2.3 on WordPress cross-site request forgery
CVE-2024-12491 | reichertbrothers SimplyRETS Real Estate IDX Plugin up to 2.11.2 on WordPress sr_search_form cross site scripting
CVE-2024-12618 | Newsletter2Go Plugin up to 4.0.14 on WordPress authorization
CVE-2024-12616 | bitlydeveloper Bitlys Plugin up to 2.7.3 on WordPress authorization
CVE-2024-5769 | surakrai MIMO WooCommerce Order Tracking Plugin up to 1.0.2 on WordPress authorization
CVE-2024-12848 | sonalsinha21 SKT Page Builder Plugin up to 4.7 on WordPress addLibraryByArchive authorization
CVE-2024-12206 | stylemix Header Builder Plugin up to 1.3.8 on WordPress stm_header_builder cross-site request forgery
CVE-2024-11815 | Posturinn Shipping with WooCommerce Plugin up to 1.3.1 on WordPress printed_marked/nonprinted_marked cross site scripting
CVE-2024-12330 | Database Backup Plugin up to 7.3 on WordPress backup
Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
The zero-day attacks leveraging the Ivanti Connect Secure (ICS) vulnerability (CVE-2025-0282) made public on Wednesday were first spotted in mid-December 2024, Mandiant researchers have shared. It’s still impossible to say whether they were mounted by a single threat actor, but the use of known malware on at least one of the compromised VPN appliances points to China-nexus espionage actor(s) – UNC5337 and UNC5221 – that have exploited ICS zero-days several times in the past few … More →
The post Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282) appeared first on Help Net Security.
APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub
The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in a sophisticated attack that compromises the privacy of cybersecurity professionals. A recent investigation by the ThreatBook Research and Response Team revealed that a popular privilege escalation tool utilized by cybersecurity experts had been backdoored, leading to significant data breaches and identity […]
The post APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.