Aggregator
CVE-2025-1845 | ESAFENET DSM 3.1.2 examExportPDF s command injection
Fog
Fog
Abyss
Apache Derby Vulnerability Let Attackers Bypass Authentication with LDAP Injection
A critical security vulnerability (CVE-2022-46337) in Apache Derby, an open-source relational database implemented entirely in Java, has exposed systems to authentication bypass attacks via LDAP injection. The flaw, rated with a CVSS score of 9.1, enables attackers to craft malicious usernames that circumvent LDAP authentication checks, potentially granting unauthorized access to sensitive data and database […]
The post Apache Derby Vulnerability Let Attackers Bypass Authentication with LDAP Injection appeared first on Cyber Security News.
近1.2万API密钥通过AI训练数据集被泄露;Vo1d僵尸网络蔓延,160万安卓电视设备沦为肉鸡 | 牛览
Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware
Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell and legitimate Microsoft applications to deploy malware without leaving significant traces on compromised systems. These sophisticated attacks, which have been around for over two decades, are proving particularly effective in bypassing traditional antivirus solutions and complicating incident response efforts. PowerShell […]
The post Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-25948 | Serosoft Academia Student Information System EagleR 1.0.118 create access control
CVE-2025-25951 | Serosoft Academia Student Information System EagleR 1.0.118 User Information executeBasicSearch information disclosure
CVE-2025-25950 | Serosoft Academia Student Information System EagleR 1.0.118 update access control
CVE-2025-25952 | Serosoft Academia Student Information System EagleR 1.0.118 API Request getStudemtAllDetailsById?studentId=XX resource injection
CVE-2025-25949 | Serosoft Academia Student Information System EagleR 1.0.118 update User ID cross site scripting
CVE-2025-1835 | osuuu LightPicture 1.2.2 /app/controller/Api.php upload file unrestricted upload
CVE-2025-1836 | Incorta 2023.4.3 Edit Insight Service Name csv injection
CVE-2025-1841 | ESAFENET CDG 5.6.3.154.205 ClientSortLog.jsp startDate/endDate sql injection
CVE-2025-1842 | FITSTATS Technologies AthleteMonitoring up to 20250302 /login.php username cross site scripting
CVE-2025-1843 | Mini-Tmall up to 20250211 ProductMapper.java select orderBy sql injection
CVE-2007-1008 | Apple iTunes 7.0.2 memory corruption (EDB-29616 / BID-22615)
JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks
Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations in Amazon Web Services (AWS) environments to conduct sophisticated phishing campaigns. Active for over five years, JavaGhost has pivoted from website defacement to leveraging compromised cloud infrastructure for financial gain. The group’s attacks stem from exposed long-term AWS access keys, which […]
The post JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.