Aggregator
CVE-2025-5831 | Droip Plugin up to 2.2.0 on WordPress make_google_font_offline unrestricted upload
CVE-2025-5835 | Droip Plugin up to 2.2.0 on WordPress Setting droip_post_apis authorization (EUVD-2025-22575)
CVE-2025-8115 | PHPGurukul Taxi Stand Management System 1.0 new-autoortaxi-entry-form.php registrationnumber/licensenumber cross site scripting
CVE-2025-3614 | ElementsKit Elementor Addons and Templates Plugin up to 3.5.2 on WordPress Custom Widget cross site scripting (EUVD-2025-22550)
CVE-2025-7001 | GitLab Community Edition/Enterprise Edition up to 18.0.4/18.1.2/18.2.0 API insufficient granularity of access control (EUVD-2025-22482 / Nessus ID 242660)
CVE-2025-4784 | Moderec Tourtella prior 26.05.2025 sql injection (EUVD-2025-22511)
CVE-2025-45731 | 2FAuth 5.5.0 Group Delete race condition (EUVD-2025-22514)
CVE-2020-15778 | OpenSSH up to 8.3p1 scp scp.c destination os command injection (Nessus ID 235514)
Dire Wolf
You must login to view this content
Dire Wolf
You must login to view this content
Dire Wolf
You must login to view this content
Chinese Hackers Exploit Software Vulnerabilities to Breach Targeted Systems
China’s Cyberspace Administration, Ministry of Public Security, and Ministry of Industry and Information Technology introduced the Regulations on the Management of Network Product Security Vulnerabilities (RMSV) in July 2021, mandating that software vulnerabilities exploitable flaws in code be reported to the MIIT within 48 hours of discovery. This policy prohibits researchers from publishing vulnerability details, […]
The post Chinese Hackers Exploit Software Vulnerabilities to Breach Targeted Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Тысячи камер в телевизорах LG показывают спальни незнакомцам. Прямо сейчас
Microsoft: macOS Sploitlight flaw leaks Apple Intelligence data
Qilin
You must login to view this content
Qilin
You must login to view this content