Aggregator
CVE-2025-66204 | WBCE CMS up to 1.6.4 Header X-Forwarded-For excessive authentication (GHSA-f676-f375-m7mw / CNNVD-202512-1078)
CVE-2025-10573 | Ivanti Endpoint Manager up to 2024 SU4 cross site scripting
CVE-2025-13661 | Ivanti Endpoint Manager up to 2024 SU4 path traversal
CVE-2025-12558 | Beaver Builder Plugin up to 2.9.4 on WordPress get_attachment_sizes information disclosure
CVE-2025-65849 | Altcha 0.8.0 Proof-of-Work Obfuscation Mode cryptographic issues (EUVD-2025-201806)
CVE-2025-65548 | NUT-14 up to 0.17.x improper validation of specified quantity in input (EUVD-2025-201796)
CISA Warns of OSGeo GeoServer 0-Day Vulnerability Exploited in Attacks
An urgent warning about a critical security flaw in OSGeo GeoServer, a widely used open-source geographic data-sharing server. CISA has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, indicating that threat actors are actively leveraging this zero-day flaw in attacks targeting both public and private sectors. The newly disclosed vulnerability, tracked as CVE-2025-58360, […]
The post CISA Warns of OSGeo GeoServer 0-Day Vulnerability Exploited in Attacks appeared first on Cyber Security News.
CVE-2025-66456
MKVCinemas streaming piracy service with 142M visits shuts down
Может ли гравитация скрутить время в узел? Астрономы подтвердили эффект, который трудно даже представить.
MKVCinemas streaming piracy service with 142M visits shuts down
当运动相机不运动:聊一台正方形画幅的超广角定焦相机
PII in email: Explanation, risks, & protection
Understand what PII is, why email puts it at risk, and how your business can strengthen security to better protect sensitive information.
The post PII in email: Explanation, risks, & protection appeared first on Security Boulevard.
What 35 years of privacy law say about the state of data protection
Privacy laws have expanded around the world, and security leaders now work within a crowded field of requirements. New research shows that these laws provide stronger rights and duties, but the protections do not always translate into reductions in harm. The study looks at thirty five years of privacy history, from the rise of early data protection efforts to the current landscape of AI driven risk, cross border transfers, and uneven enforcement. The researchers from … More →
The post What 35 years of privacy law say about the state of data protection appeared first on Help Net Security.