Aggregator
CVE-2025-30318 | Adobe InDesign Desktop up to 19.5.2/20.2 out-of-bounds write (apsb25-37 / Nessus ID 235874)
CVE-2025-30319 | Adobe InDesign Desktop up to 19.5.2/20.2 null pointer dereference (apsb25-37 / Nessus ID 235874)
CVE-2025-30320 | Adobe InDesign Desktop up to 19.5.2/20.2 null pointer dereference (apsb25-37 / Nessus ID 235874)
CVE-2025-30310 | Adobe Dreamweaver Desktop up to 21.4 type confusion (apsb25-35 / Nessus ID 235866)
CVE-2024-3433 | PuneethReddyHC Event Management 1.0 /backend/register.php event_id/full_name/email/mobile/college/branch cross site scripting (ID 177841)
CVE-2024-3432 | PuneethReddyHC Event Management 1.0 /backend/register.php event_id/full_name/email/mobile/college/branch sql injection (Duplicate CVE-2024-28322 / ID 177841)
CVE-2025-21609 | SiYuan 3.1.18 getDocHistoryContent cleanup (Nessus ID 213966)
CVE-2024-12941 | CodeAstro Blood Donor Management System 1.0 deletedannounce.php ID sql injection
Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files
Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect malicious .desktop files, a novel attack vector leveraged by threat actors to compromise systems. Initially documented by Zscaler researchers in 2023, this technique involves the abuse of .desktop files-plain text configuration files used to define application launch behavior in Linux desktop […]
The post Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
热点|奢侈品巨头“迪奥”中国用户信息泄露,数据安全再拉警报!
Named an Example Vendor in 2025 Gartner® Guidance for Workforce Access Management Report
BOULDER, Colo.– Strata Identity, the Identity Orchestration company, today announced it has been named an Example Vendor in the 2025 Gartner Guidance for Workforce Access Management report by Paul Rabinovich. As noted in the report, “this research helps identity architects to modernize their AM implementations.” Orchestrated authentication that adapts to any identity system Strata’s Maverics platform modernizes...
The post Named an Example Vendor in 2025 Gartner® Guidance for Workforce Access Management Report appeared first on Strata.io.
The post Named an Example Vendor in 2025 Gartner® Guidance for Workforce Access Management Report appeared first on Security Boulevard.
Alleged Sale of Unauthorized Web Shell Access to Multiple Unidentified Websites
New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution
Adobe has released critical security updates addressing three high-severity vulnerabilities (CVE-2025-30324, CVE-2025-30325, CVE-2025-30326) in Photoshop 2024 and 2025 that could enable arbitrary code execution on Windows and macOS systems. The flaws, discovered by external researcher yjdfy through Adobe’s HackerOne bug bounty program, involve memory corruption risks stemming from integer manipulation and uninitialized pointer access. While […]
The post New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Severe Adobe Illustrator Flaw Allows Remote Code Execution
Adobe has issued an urgent security update for its widely used graphic design software, Adobe Illustrator, following the discovery of a critical heap-based buffer overflow vulnerability tracked as CVE-2025-30330. This flaw, which allows arbitrary code execution on affected systems, impacts both Windows and macOS versions of Illustrator 2024 and 2025. Rated with a CVSS score […]
The post Severe Adobe Illustrator Flaw Allows Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character
A new attack vector where cybercriminals are weaponizing Google Calendar invites to deliver malware, using a sophisticated obfuscation technique involving just a single visible character that hides malicious code. This discovery highlights how threat actors are evolving their tactics to bypass traditional security measures by exploiting trusted platforms. In March 2025, security researchers at Aikido […]
The post Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character appeared first on Cyber Security News.