Tag: cve
-
From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer (MFT) that’s assessed to have come under active exploitation since at least September 11, 2025.The company said it began its investigation on September 11 following a “potential vulnerability” reported by a customer, uncovering “potentially suspicious…
-
From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer (MFT) that’s assessed to have come under active exploitation since at least September 11, 2025.The company said it began its investigation on September 11 following a “potential vulnerability” reported by a customer, uncovering “potentially suspicious…
-
From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer (MFT) that’s assessed to have come under active exploitation since at least September 11, 2025.The company said it began its investigation on September 11 following a “potential vulnerability” reported by a customer, uncovering “potentially suspicious…
-
Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)
CVE-2025-11371, a unauthenticated Local File Inclusion vulnerability in Gladinet CentreStack and Triofox file-sharing and remote access platforms, is being exploited by … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/10/gladinet-centrestack-vulnerability-exploited-cve-2025-11371/
-
From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability
Tags: cve, cybersecurity, exploit, flaw, rce, remote-code-execution, software, vulnerability, zero-dayCybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security flaw impacting Gladinet CentreStack and TrioFox products.The zero-day vulnerability, tracked as CVE-2025-11371 (CVSS score: 6.1), is an unauthenticated local file inclusion bug that allows unintended disclosure of system files. It impacts all versions of the software prior to and First seen…
-
U.S. CISA adds Grafana flaw to its Known Exploited Vulnerabilities catalog
Tags: cisa, cve, cybersecurity, exploit, flaw, infrastructure, kev, monitoring, open-source, vulnerabilityU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Grafana flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Grafana flaw, tracked as CVE-2021-43798 (CVSS score 7.5), to its Known Exploited Vulnerabilities (KEV) catalog. Grafana is an open-source platform for monitoring and observability. This flaw is a directory traversal vulnerability affecting versions…
-
RondoDox Botnet Targets Over 50 Vulnerabilities to Compromise Routers, CCTV Systems, and Web Servers
The RondoDox campaign’s “exploit shotgun” method leverages over 50 vulnerabilities across more than 30 vendors to infiltrate network devices, highlighting the urgent need for rapid patching and continuous monitoring. The first detected RondoDox intrusion on June 15, 2025, reused a command”injection vulnerability disclosed at Pwn2Own Toronto 2022: CVE-2023-1389, which targets the WAN interface of TP-Link…
-
Response to Oracle Security Alert Advisory: Oracle E-Business Suite Pre-Auth RCE (CVE-2025-61882)
AttackIQ has released a new emulation in response to the Oracle Security Alert Advisory detailing the CVE-2025-61882 vulnerability, which impacts Oracle E-Business Suite versions 12.2.3 through 12.2.14. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/response-to-oracle-security-alert-advisory-oracle-e-business-suite-pre-auth-rce-cve-2025-61882/
-
CVE-2025-61882 Explained: The Oracle Zero-Day Breach That Hit Enterprises Hard
Tags: authentication, breach, business, cve, exploit, flaw, group, oracle, ransomware, remote-code-execution, vulnerability, zero-dayA critical zero-day vulnerability in Oracle E-Business Suite (EBS) was exploited by the Cl0p ransomware group in mid-2025. The flaw, later tracked as CVE-2025-61882, allowed remote code execution without authentication,… The post CVE-2025-61882 Explained: The Oracle Zero-Day Breach That Hit Enterprises Hard appeared first on Strobes Security. First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2025/10/cve-2025-61882-explained-the-oracle-zero-day-breach-that-hit-enterprises-hard/
-
CVE-2025-5947: WordPress Plugin flaw lets hackers access Admin accounts
Threat actors are exploiting a critical flaw, tracked as CVE-2025-5947, in the Service Finder WordPress theme’s Bookings plugin. Threat actors are exploiting a critical vulnerability, tracked as CVE-2025-5947 (CVSS score 9.8), in the Service Finder WordPress theme’s Bookings plugin. The plugin (versions ≤6.0) has an authentication bypass issue allowing attackers to log in as any…
-
Severe Framelink Figma MCP Vulnerability Lets Hackers Execute Code Remotely
Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol (MCP) server that could allow attackers to achieve code execution.The vulnerability, tracked as CVE-2025-53967 (CVSS score: 7.5), is a command injection bug stemming from the unsanitized use of user input, opening the door to a scenario where an attacker…
-
Redis Lua Code Execution Vulnerability (CVE-2025-49844) Notice
Overview Recently, NSFOCUS CERT detected that Redis issued a security bulletin and fixed the Redis Lua code execution vulnerability (CVE-2025-49844); Because Redis’s Lua script engine has a use-after-free reuse vulnerability when handling memory management, an authenticated attacker can write a specially crafted Lua script to manipulate the memory recycling mechanism and execute the Lua script…The…
-
Redis Lua Code Execution Vulnerability (CVE-2025-49844) Notice
Overview Recently, NSFOCUS CERT detected that Redis issued a security bulletin and fixed the Redis Lua code execution vulnerability (CVE-2025-49844); Because Redis’s Lua script engine has a use-after-free reuse vulnerability when handling memory management, an authenticated attacker can write a specially crafted Lua script to manipulate the memory recycling mechanism and execute the Lua script…The…
-
PoC Released for Linux Kernel ksmbd Filesystem Vulnerability
Security researcher Norbert Szetei published the final installment of his deep-dive into the ksmbd filesystem module, culminating in a working proof-of-concept exploit targeting CVE-2025-37947. Unlike earlier use-after-free candidates that required complex race conditions or depended on external factors, this vulnerability offers a deterministic out-of-bounds (OOB) write primitive. Szetei’s PoC was tested on Ubuntu 22.04.5 LTS…
-
Redis Lua Code Execution Vulnerability (CVE-2025-49844) Notice
Overview Recently, NSFOCUS CERT detected that Redis issued a security bulletin and fixed the Redis Lua code execution vulnerability (CVE-2025-49844); Because Redis’s Lua script engine has a use-after-free reuse vulnerability when handling memory management, an authenticated attacker can write a specially crafted Lua script to manipulate the memory recycling mechanism and execute the Lua script…The…
-
CISA Warns of Actively Exploited Zero-Day XSS Flaw in Zimbra Collaboration Suite
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) have issued an urgent alert concerning an actively exploited zero-day vulnerability in the Zimbra Collaboration Suite (ZCS). The flaw, identified as CVE-2025-27915, is a cross-site scripting (XSS) vulnerability that impacts the ZCS Classic Web Client. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/zimbra-zcs-flaw-cve-2025-27915/
-
CISA Warns of Actively Exploited Zero-Day XSS Flaw in Zimbra Collaboration Suite
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) have issued an urgent alert concerning an actively exploited zero-day vulnerability in the Zimbra Collaboration Suite (ZCS). The flaw, identified as CVE-2025-27915, is a cross-site scripting (XSS) vulnerability that impacts the ZCS Classic Web Client. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/zimbra-zcs-flaw-cve-2025-27915/
-
Exposure Management Beyond The Endpoint
Tags: advisory, ai, api, attack, breach, business, cisa, cloud, compliance, cve, cyber, cybersecurity, data, detection, edr, endpoint, exploit, identity, infrastructure, intelligence, kev, mssp, risk, service, technology, threat, tool, vulnerability, vulnerability-management, windowsRelying on an endpoint-centric approach to exposure management can leave you with blind spots that increase risk. You need to see your environment like an attacker does. Key takeaways: Long remediation cycles and difficulty prioritizing risk are significant challenges for security teams. Exposure management capabilities bolted onto existing security tools result in dashboard fatigue and…
-
Exposure Management Beyond The Endpoint
Tags: advisory, ai, api, attack, breach, business, cisa, cloud, compliance, cve, cyber, cybersecurity, data, detection, edr, endpoint, exploit, identity, infrastructure, intelligence, kev, mssp, risk, service, technology, threat, tool, vulnerability, vulnerability-management, windowsRelying on an endpoint-centric approach to exposure management can leave you with blind spots that increase risk. You need to see your environment like an attacker does. Key takeaways: Long remediation cycles and difficulty prioritizing risk are significant challenges for security teams. Exposure management capabilities bolted onto existing security tools result in dashboard fatigue and…
-
Exposure Management Beyond The Endpoint
Tags: advisory, ai, api, attack, breach, business, cisa, cloud, compliance, cve, cyber, cybersecurity, data, detection, edr, endpoint, exploit, identity, infrastructure, intelligence, kev, mssp, risk, service, technology, threat, tool, vulnerability, vulnerability-management, windowsRelying on an endpoint-centric approach to exposure management can leave you with blind spots that increase risk. You need to see your environment like an attacker does. Key takeaways: Long remediation cycles and difficulty prioritizing risk are significant challenges for security teams. Exposure management capabilities bolted onto existing security tools result in dashboard fatigue and…
-
Sicherheitsupdate für Falcon Sensor for Windows (CVE-2025-42701, CVE-2025-42706)
Es gibt in den CrowdStrike Falcon Sensoren for Windows zwei Schwachstelle mit mittlerem Score, die durch den Hersteller per Update gepatcht wurden. Momentan entbrennt eine Diskussion, weil CrowdStrike das als “Issue” bezeichnet, während Sicherheitsforscher das Ganze als “Schließen von Sicherheitslücken” … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/10/09/crowdstrike-sicherheitsupdate-fuer-falcon-sensor-for-windows-cve-2025-42701-cve-2025-42706/
-
Sicherheitsupdate für Falcon Sensor for Windows (CVE-2025-42701, CVE-2025-42706)
Es gibt in den CrowdStrike Falcon Sensoren for Windows zwei Schwachstelle mit mittlerem Score, die durch den Hersteller per Update gepatcht wurden. Momentan entbrennt eine Diskussion, weil CrowdStrike das als “Issue” bezeichnet, während Sicherheitsforscher das Ganze als “Schließen von Sicherheitslücken” … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/10/09/crowdstrike-sicherheitsupdate-fuer-falcon-sensor-for-windows-cve-2025-42701-cve-2025-42706/
-
Critical Redis Flaw Could Compromise Most Cloud Environments
A Redis flaw, CVE-2025-49844, exposes 75% of cloud systems to remote code execution, data theft, and full system compromise. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/redis-vulnerability-cloud-compromise/
-
Critical Redis Flaw Could Compromise Most Cloud Environments
A Redis flaw, CVE-2025-49844, exposes 75% of cloud systems to remote code execution, data theft, and full system compromise. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/redis-vulnerability-cloud-compromise/
-
Critical Redis Flaw Could Compromise Most Cloud Environments
A Redis flaw, CVE-2025-49844, exposes 75% of cloud systems to remote code execution, data theft, and full system compromise. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/redis-vulnerability-cloud-compromise/
-
AWS Client VPN for macOS Hit by Critical Privilege Escalation Vulnerability
Amazon Web Services (AWS) released bulletin AWS-2025-020 detailing a serious flaw in the macOS version of its Client VPN software. The issue, tracked as CVE-2025-11462, arises when the VPN client fails to validate the log destination directory during log rotation. CVE ID Affected Products Impact Exploit Prerequisites CVSS 3.1 Score CVE-2025-11462 AWS Client VPN Client…
-
AWS Client VPN for macOS Hit by Critical Privilege Escalation Vulnerability
Amazon Web Services (AWS) released bulletin AWS-2025-020 detailing a serious flaw in the macOS version of its Client VPN software. The issue, tracked as CVE-2025-11462, arises when the VPN client fails to validate the log destination directory during log rotation. CVE ID Affected Products Impact Exploit Prerequisites CVSS 3.1 Score CVE-2025-11462 AWS Client VPN Client…
-
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely, Patch Now
Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol (MCP) server that could allow attackers to achieve code execution.The vulnerability, tracked as CVE-2025-53967 (CVSS score: 7.5), is a command injection bug stemming from the unsanitized use of user input, opening the door to a scenario where an attacker…

