Aggregator
CVE-2025-4608 | Structured Content Plugin up to 1.6.4 on WordPress Shortcode sc_fs_local_business cross site scripting (EUVD-2025-22495)
CVE-2025-6382 | Taeggie Feed Plugin up to 0.1.10 on WordPress Shortcode render Name cross site scripting (EUVD-2025-22496)
CVE-2025-5084 | Post Grid Master Plugin up to 3.4.13 on WordPress argsArray['read_more_text'] cross site scripting (EUVD-2025-22509)
CVE-2025-7695 | Dataverse Integration Plugin up to 2.81 on WordPress REST Endpoint reset_password_link get_password_reset_key authorization (EUVD-2025-22494)
CVE-2025-6588 | FunnelCockpit Plugin up to 1.4.2 on WordPress Error cross site scripting (EUVD-2025-22493)
CVE-2025-7835 | iThoughts Advanced Code Editor Plugin up to 1.2.10 on WordPress Setting ithoughts_ace_update_options cross-site request forgery (EUVD-2025-22492)
CVE-2025-7959 | Station Pro Plugin up to 2.4.2 on WordPress width/height cross site scripting (EUVD-2025-22490)
猎影计划:从密流中捕获 Cobalt Strike 的隐秘身影
Splunk Guide to Detect, Mitigate, and Respond to the CitrixBleed 2 Vulnerability
The cybersecurity landscape is grappling with CVE-2025-5777, informally known as “CitrixBleed 2,” an out-of-bounds memory read vulnerability affecting Citrix NetScaler ADC and Gateway devices. This flaw, echoing the notorious CVE-2023-4966 from 2023, enables unauthenticated attackers to leak sensitive memory contents, including session tokens and authentication credentials, via malformed HTTP POST requests to the /p/u/doAuthentication.do endpoint. […]
The post Splunk Guide to Detect, Mitigate, and Respond to the CitrixBleed 2 Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-7690 | Affiliate Plus Plugin up to 1.3.2 on WordPress Setting affiplus_settings cross-site request forgery (EUVD-2025-22491)
CVE-2025-2923 | HDF5 up to 1.14.6 src/H5Fint.c H5F_addr_encode_len pp heap-based overflow (Issue 5381 / EUVD-2025-8650)
CVE-2025-2913 | HDF5 up to 1.14.6 src/H5FL.c H5FL__blk_gc_list H5FL_blk_head_t use after free (Issue 5376 / EUVD-2025-8633)
CVE-2025-2924 | HDF5 up to 1.14.6 src/H5HLcache.c H5HL__fl_deserialize free_block heap-based overflow (Issue 5382 / EUVD-2025-8649)
CVE-2025-2914 | HDF5 up to 1.14.6 src/H5FScache.c H5FS__sinfo_Srialize_Sct_cb sect heap-based overflow (Issue 5379 / EUVD-2025-8637)
New AI-Powered Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy
WhoFi surfaced last on the public repository ArXiv, stunning security teams with a proof-of-concept that turns ordinary 2.4 GHz routers into covert biometric scanners. Unlike camera-based systems, this neural pipeline fingerprints the unique way a body distorts Wi-Fi channel state information (CSI), letting an attacker identify someone from the opposite side of a plaster wall, […]
The post New AI-Powered Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy appeared first on Cyber Security News.
Хакеры проникли в ядерное ведомство США и теперь шантажируют целые штаты
Top Email Security Risks for Businesses and How to Catch Them Before They Cause Damage
Even with all the new ways we stay in touch, Slack, Teams, DMs, email is still the backbone of business communication. That also makes it one of the easiest ways in for attackers. A single message with the right subject line or attachment can lead to stolen logins, malware infections, or even full network access. […]
The post Top Email Security Risks for Businesses and How to Catch Them Before They Cause Damage appeared first on ANY.RUN's Cybersecurity Blog.