Aggregator
CVE-2025-65637 | sirupsen logrus up to 1.8.2/1.9.2 Entry.Writer denial of service (Exploit 1370 / EUVD-2025-201258)
CVE-2026-20079 | Cisco Secure Firewall Management Center up to 7.7.11 Web Interface authentication bypass (cisco-sa-onprem-fmc-authbypass-5JPp45V2 / WID-SEC-2026-0610)
CVE-2026-20002 | Cisco Secure Firewall Management Center up to 7.7.10.1 Web-based Management Interface sql injection (cisco-sa-fmc-sql-injection-2qH6CcJd / WID-SEC-2026-0610)
CVE-2026-20003 | Cisco Secure Firewall Management Center up to 7.7.10.1 REST API sql injection (cisco-sa-fmc-sql-injection-2qH6CcJd / WID-SEC-2026-0610)
HHS updates a free risk tool to help hospitals size up their cybersecurity exposure
HHS has updated its free RISC 2.0 toolkit with a new cybersecurity module, asking hospitals to assess digital threats alongside hurricanes, power failures and other hazards.
The post HHS updates a free risk tool to help hospitals size up their cybersecurity exposure appeared first on CyberScoop.
CVE-2025-14516 | Yalantis uCrop 2.2.11 URL com.yalantis.ucrop.task.BitmapLoadTask.java downloadFile server-side request forgery (EUVD-2025-202689)
CVE-2026-28414 | gradio-app gradio up to 6.6 on Windows /windows/win.ini absolute path traversal (GHSA-39mp-8hj3-5c49 / EUVD-2026-9082)
CVE-2025-14532 | Studio Fabryka DobryCMS up to 4.x unrestricted upload
CVE-2026-27167 | gradio-app gradio up to 6.5.x OAuth /login/huggingface get_token hard-coded credentials (GHSA-h3h8-3v2v-rg7m / EUVD-2026-9075)
CVE-2026-28272 | kiteworks up to 9.1.x User Interface cross site scripting (GHSA-7hxj-ch78-xqgr / EUVD-2026-9067)
CVE-2026-28231 | bigcat88 pillow_heif up to 1.2.x HEIF Image Parser _pillow_heif.c out-of-bounds (GHSA-5gjj-6r7v-ph3x / EUVD-2026-9061)
CVE-2026-28270 | kiteworks up to 9.1.x Configuration unrestricted upload (EUVD-2026-9065)
CVE-2026-28271 | kiteworks up to 9.1.x Configuration dns rebinding (EUVD-2026-9066)
CVE-2026-28354 | MacWarrior clipbucket-v5 up to up to 5.5.2 add_to_collection.php removeItemFromCollection authorization (GHSA-6wf8-rw5f-c9mv / EUVD-2026-9062)
Phobos Ransomware admin faces up to 20 years after guilty plea
What's Actually in an Anti-Kidnapping Kit and Why High-Risk Individuals Should Care
Threat Actors Using Fake Claude Code Download to Deploy Infostealer
Cybercriminals have found a new way to target developers and IT professionals by setting up fake download pages that impersonate Claude Code, a legitimate AI coding assistant. These deceptive pages trick users into downloading what appears to be an official installation package, but instead silently deploy an infostealer malware onto the victim’s system. The use […]
The post Threat Actors Using Fake Claude Code Download to Deploy Infostealer appeared first on Cyber Security News.