Aggregator
CVE-2025-8293 | Intl DateTime Calendar Plugin up to 1.0.1 on WordPress Date cross site scripting (EUVD-2025-25058)
CVE-2025-7686 | weichuncai WP伪春菜 Plugin up to 1.5 on WordPress Setting sm-options.php cross-site request forgery (EUVD-2025-25057)
CVE-2025-7439 | Anber Elementor Addon Plugin up to 1.0.1 on WordPress Banner Button Link anber_item cross site scripting (EUVD-2025-25060)
CVE-2025-7441 | StoryChief Plugin up to 1.0.42 on WordPress API Endpoint webhook unrestricted upload (EUVD-2025-25062)
CVE-2025-7668 | Linux Promotional Plugin up to 1.4 on WordPress Setting inux-promotional-plugin.php cross-site request forgery (EUVD-2025-25063)
CVE-2025-7664 | AL Pack Plugin up to 1.0.2 on WordPress Unauthenticated Premium Feature activate check_activate_permission authorization (EUVD-2025-25064)
CVE-2025-7683 | LatestCheckins Plugin on WordPress Setting cross-site request forgery (EUVD-2025-25061)
CVE-2025-6080 | WPGYM Plugin up to 67.7.0 on WordPress Account Creation authorization (EUVD-2025-25065)
CVE-2025-7649 | Surbma Plugin up to 2.0 on WordPress Shortcode recent-comments cross site scripting (EUVD-2025-25068)
CVE-2025-38501 | Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0 ksmbd resource consumption (EUVD-2025-25072)
CVE-2025-7440 | Anber Elementor Addon Plugin up to 1.0.1 on WordPress $item['button_link']['url'] cross site scripting (EUVD-2025-25066)
【通知】第三届全国大学生开源情报数据采集与分析大赛开始报名啦!提供免费培训
【情报】湾湾的雷达站(含经纬度)
monkey365: conduct Microsoft 365, Azure subscriptions and Azure Active Directory security configuration reviews
monkey365 Monkey365 is an Open Source security tool that can be used to easily conduct not only Microsoft 365 but also Azure subscriptions and Azure Active Directory security configuration reviews without the significant overhead...
The post monkey365: conduct Microsoft 365, Azure subscriptions and Azure Active Directory security configuration reviews appeared first on Penetration Testing Tools.
SQLiDetector: detect SQL injection Error based
SQLiDetector Simple python script supported with BurpBouty profile that helps you to detect SQL injection “Error based” by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases. The...
The post SQLiDetector: detect SQL injection Error based appeared first on Penetration Testing Tools.
Beyond Phishing: A Closer Look at Blind Eagle’s New, More Stealthy Attacks
The APT-C-36 group (Blind Eagle) intensified its operations in May 2025, focusing attacks on Colombian government institutions and major corporations, as well as on organizations in other South American countries, including Ecuador, Chile, and...
The post Beyond Phishing: A Closer Look at Blind Eagle’s New, More Stealthy Attacks appeared first on Penetration Testing Tools.
Zero-Day Attack Takes Down Stock in the Channel, Disrupting IT Supply Chain
The British company Stock in the Channel (STIC), which provides a digital platform for monitoring the availability and pricing of IT equipment, has reported a cyberattack that caused a large-scale disruption of its services....
The post Zero-Day Attack Takes Down Stock in the Channel, Disrupting IT Supply Chain appeared first on Penetration Testing Tools.
The “Human Factor”: Why a Next-Gen Linux Filesystem Is on the Ropes
The first release of the Linux 6.17 kernel has arrived—yet it contains no updates related to the bcachefs file system. And the reason lies not in technical shortcomings. On August 10, Linus Torvalds announced...
The post The “Human Factor”: Why a Next-Gen Linux Filesystem Is on the Ropes appeared first on Penetration Testing Tools.