Aggregator
CVE-2023-48319 | Salon Booking System Plugin up to 8.6 on WordPress privileges management
CVE-2024-53825 | Ninja Team Filebird Plugin up to 6.3.2 on WordPress authorization
CVE-2023-25966 | Ninja Team Filebird Plugin up to 5.1.4 on WordPress authorization
CVE-2022-45186 | SalesAgility SuiteCRM 7.12.7 improper authentication
CVE-2022-45185 | SalesAgility SuiteCRM 7.12.7 unrestricted upload
CVE-2024-33651 | Matthew Fries MF Gig Calendar Plugin up to 1.2.1 on WordPress cross-site request forgery
CVE-2024-54211 | Visualmodo Borderless Plugin up to 1.5.8 on WordPress cross site scripting
CVE-2024-53481 | PHPGurukul Beauty Parlour Management System 1.1 profile.php Firstname/Last name cross site scripting
MITRE Ends CVE Program Support – Leaked Internal Memo Confirms Departure
A leaked internal memo dated April 15, 2025, has sent shockwaves through the cybersecurity community, revealing that MITRE’s contract to operate the Common Vulnerabilities and Exposures (CVE) program is set to expire today, April 16, 2025. The letter, reportedly obtained from a reliable source and addressed to CVE Board Members, is signed by Yosry Barsoum, […]
The post MITRE Ends CVE Program Support – Leaked Internal Memo Confirms Departure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE закрывается — мир остаётся без карты уязвимостей
CVE-2024-47102 | IBM AIX/VIOS perfstat Kernel Extension denial of service (Nessus ID 234452)
CVE-2024-52906 | IBM AIX/VIOS TCP IP Kernel denial of service (Nessus ID 234452)
CVE-2024-45712 | SolarWinds Serv-U up to 15.5 cross site scripting (Nessus ID 234441)
CVE-2025-3620 | Google Chrome up to 135.0.7049.41 USB use after free (Nessus ID 234454)
美国CISA紧急拨款维持CVE漏洞数据库运转
JVN: Growatt製Cloud portalにおける複数の脆弱性
When companies merge, so do their cyber threats
For CISOs, mergers and acquisitions (M&A) bring both potential and risk. These deals can drive growth, but they also open the door to serious cybersecurity threats that may derail the transaction. Strong due diligence, smart risk planning, and a shared security mindset can help keep deals on track and protect the business. Key cybersecurity risks in M&A 1. Inherited vulnerabilities: Acquiring a company means inheriting its existing cybersecurity weaknesses. If the target company has unresolved … More →
The post When companies merge, so do their cyber threats appeared first on Help Net Security.