Aggregator
CVE-2025-7524 | TOTOLINK T6 4.1.5cu.748_B20211015 HTTP POST Request /cgi-bin/cstecgi.cgi setDiagnosisCfg ip command injection (EUVD-2025-21252)
Fortinet FortiWeb Fabric Connector Flaw Enables Remote Code Execution
Security researchers have identified a severe pre-authentication SQL injection vulnerability in Fortinet’s FortiWeb Fabric Connector, designated as CVE-2025-25257, that allows unauthenticated attackers to execute unauthorized SQL commands and potentially achieve remote code execution. The vulnerability affects multiple versions of FortiWeb, including 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2.10, and 7.0.0 through 7.0.10, with […]
The post Fortinet FortiWeb Fabric Connector Flaw Enables Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2004-0282 | Crob FTP Server 3.5.2 Connection denial of service (EDB-23689 / Nessus ID 12060)
28 giugno: Guasto ai radar del Nord Italia
CVE-2010-4902 | Joomla-clantools Clantools Com Clantools index.php showgame sql injection (EDB-14902 / BID-42986)
CVE-2005-3508 | Galerie 2.4 showgallery.php galid sql injection (EDB-26468 / BID-15313)
Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION
Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION
LLM crawlers continue to DDoS SourceHut
Мозг + ИИ = меньше кода. И больше паники в open source
How I do it
CVE-2008-3941 | BizDirectory 1.9/2.0/2.04 page cross site scripting (EDB-32312 / BID-30980)
CVE-2004-0204 | Business Objects Crystal Enterprise 1.2 crystalimagehandler.aspx path traversal (Nessus ID 12271 / ID 90113)
CVE-2004-0205 | Microsoft IIS 4.0 Redirect memory corruption (MS04-021 / VU#717748)
CVE-2004-0206 | Microsoft Windows memory corruption (MS04-031 / VU#640488)
CVE-2004-0211 | Microsoft Windows denial of service (MS04-032 / VU#119262)
CVE-2004-0208 | Microsoft Windows privileges management (MS04-032 / VU#910998)
CVE-2004-0209 | Microsoft Windows memory corruption (MS04-032 / VU#806278)
Cybersecurity AI: An open Bug Bounty-ready Artificial Intelligence
A lightweight, ergonomic framework for building bug bounty-ready Cybersecurity AIs (CAIs). Why CAI? The cybersecurity landscape is undergoing a dramatic transformation as AI becomes increasingly integrated into security operations. We predict that by 2028, AI-powered...
The post Cybersecurity AI: An open Bug Bounty-ready Artificial Intelligence appeared first on Penetration Testing Tools.