Aggregator
CVE-2025-7767 | PHPGurukul Art Gallery Management System 1.1 edit-art-medium-detail.php artmed cross site scripting
CVE-2025-7765 | code-projects Online Appointment Booking System 1.0 addmanagerclinic.php clinic sql injection
CVE-2025-7764 | code-projects Online Appointment Booking System 1.0 deletedoctorclinic.php clinic sql injection
UNG0002 Actors Deploys Weaponize LNK Files Using ClickFix Fake CAPTCHA Verification Pages
A sophisticated espionage campaign targeting multiple Asian jurisdictions has emerged, utilizing weaponized shortcut files and deceptive social engineering techniques to infiltrate high-value targets across China, Hong Kong, and Pakistan. The threat actor, designated UNG0002 (Unknown Group 0002), has demonstrated remarkable persistence and technical evolution throughout two major operational phases spanning from May 2024 to the […]
The post UNG0002 Actors Deploys Weaponize LNK Files Using ClickFix Fake CAPTCHA Verification Pages appeared first on Cyber Security News.
CVE-2025-53941 | fedify-dev hollo up to 0.6.4 ActivityPub cross site scripting (GHSA-w7gc-g3x7-hq8h / EUVD-2025-21766)
CVE-2025-53928 | MaxKB up to 1.10.8-lts MCP Call code injection (GHSA-38q2-4mm7-qf5h / EUVD-2025-21771)
CVE-2025-53946 | LabRedesCefetRJ WeGIA up to 3.4.4 profile_paciente.php id_funcionario sql injection (GHSA-532r-mgxv-g7jm)
CVE-2025-54060 | LabRedesCefetRJ WeGIA up to 3.4.5 dependente_editarInfoPessoal.php idatendido_familiares sql injection (EUVD-2025-21769)
CVE-2025-54058 | LabRedesCefetRJ WeGIA up to 3.4.5 dependente_editarEndereco.php idatendido_familiares sql injection (EUVD-2025-21770)
Submit #616195: PHPGurukul Art Gallery Management System V1.1 stored xss [Accepted]
CVE-2025-7763 | thinkgem JeeSite up to 5.12.0 Site Controller/SSO redirect (28/29 / EUVD-2025-21826)
Submit #616176: code-projects Online Appointment Booking System V1.0 SQL injection [Accepted]
Submit #616175: code-projects Online Appointment Booking System V1.0 SQL injection [Accepted]
Submit #616103: JeeSite https://github.com/thinkgem/jeesite5 <=5.12.0 Open Redirect [Accepted]
4 ГБ в один клик, GigaChat и Госключ: что уже умеет мессенджер MAX
Massistant: Chinese Mobile Forensic Tool Accesses SMS, Images, Audio, and GPS Data
Cybersecurity researchers at Lookout Threat Lab have uncovered a sophisticated mobile forensics application called Massistant, deployed by Chinese law enforcement to extract comprehensive data from confiscated mobile devices. The tool represents a significant evolution from its predecessor MFSocket, incorporating advanced capabilities to bypass device security measures and collect sensitive information including SMS messages, images, audio […]
The post Massistant: Chinese Mobile Forensic Tool Accesses SMS, Images, Audio, and GPS Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-7762 | D-Link DI-8100 16.07.26A1 HTTP Request /menu_nat_more.asp stack-based overflow (EUVD-2025-21829)
Submit #615796: D-Link DI-8100 16.07.26A1 Buffer Overflow [Accepted]
Akira
You must login to view this content