Aggregator
CVE-2025-43009 | SAP Service Parts Management up to SAP_APPL 600 SPM authorization (EUVD-2025-14340)
CVE-2025-43011 | SAP Landscape Transformation up to S4CORE 102 PCL Basis Module authorization (EUVD-2025-14338)
CVE-2025-4632 | Samsung Electronics MagicINFO 9 Server 21.1050 path traversal (EUVD-2025-14362)
CVE-2025-22249 | VMware Aria Automation up to 8.18.1 Patch 1 URL cross site scripting (EUVD-2025-14367)
Safepay
You must login to view this content
Safepay
You must login to view this content
Moldovan Police arrested a 45-year-old foreign man participating in ransomware attacks on Dutch companies
Safepay
You must login to view this content
CISA Adds Five Known Exploited Vulnerabilities to Catalog
CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2025-30400 Microsoft Windows DWM Core Library Use-After-Free Vulnerability
- CVE-2025-32701 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability
- CVE-2025-32706 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability
- CVE-2025-30397 Microsoft Windows Scripting Engine Type Confusion Vulnerability
- CVE-2025-32709 Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
A DDoS Attack Just Breached Your Defenses — Now What?
Five Years Later: Evolving IoT Cybersecurity Guidelines
Safepay
You must login to view this content
Safepay
You must login to view this content
Safepay
You must login to view this content
Safepay
You must login to view this content
“А вдруг повезёт”: половина россиян ставит софт из Интернета на удачу
Safepay
You must login to view this content