Aggregator
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2025-25257 Fortinet FortiWeb SQL Injection Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
New “LameHug” Malware Deploys AI-Generated Commands
CVE-2025-6185 | Leviton AcquiSuite/Energy Monitoring Hub URL Parameter cross site scripting (icsa-25-198-01)
Cambodia Arrests More Than 1,000 in Cyberscam Crackdown
Cambodian police and military arrested more than 1,000 people in a crackdown on cyberscam operations that have proliferated in recent years in Southeast Asia and now are spreading globally, ensnaring hundreds of thousands of people in human trafficking schemes who are forced to run romance and other online frauds.
The post Cambodia Arrests More Than 1,000 in Cyberscam Crackdown appeared first on Security Boulevard.
New “Daemon Ex Plist” Vulnerability Gives Attackers Root Access on macOS
A critical vulnerability in macOS allows attackers to escalate privileges to root access through misconfigured daemon services. The vulnerability, dubbed “Daemon Ex Plist,” exploits weaknesses in how macOS handles service property list (plist) files and has been found to affect multiple popular VPN applications and other software. Key Takeaways1. macOS daemons left behind in /Library/LaunchDaemons/ […]
The post New “Daemon Ex Plist” Vulnerability Gives Attackers Root Access on macOS appeared first on Cyber Security News.
CVE-2025-49486 | Balbooa Gallery Component up to 2.4.0 on Joomla Gallery Item cross site scripting (EUVD-2025-21873)
CVE-2025-49485 | Balbooa Forms Component up to 2.3.1.1 on Joomla ID sql injection (EUVD-2025-21872)
CVE-2025-50057 | rsjoomla RSFiles Component up to 1.17.7 on Joomla Search resource consumption (EUVD-2025-21870)
CVE-2025-49484 | joomsky JS Jobs Component up to 1.4.1 on Joomla cvid sql injection (EUVD-2025-21874)
CVE-2025-2425 | ESET NOD32 Antivirus toctou (EUVD-2025-21865)
CVE-2025-50126 | rsjoomla RSBlog Component up to 1.14.5 on Joomla jform[tags_text] cross site scripting (EUVD-2025-21868)
CVE-2025-50058 | rsjoomla RSDirectory Component up to 2.2.8 on Joomla Review Reply cross site scripting (EUVD-2025-21869)
CVE-2025-50056 | rsjoomla RSMail Component up to 1.22.28 on Joomla crafted cross site scripting (EUVD-2025-21871)
$27 млн испарились за ночь: BigONE пал жертвой атаки на цепочку поставок
Critical MCP Vulnerabilities are Slipping Through the Cracks
We must pay attention to what holds everything together - the glue. That’s where the real MCP vulnerabilities are hiding.
The post Critical MCP Vulnerabilities are Slipping Through the Cracks appeared first on Security Boulevard.