Posted by Apple Product Security via Fulldisclosure on Jul 29 APPLE-SA-07-29-2025-3 macOS Sequoia 15.6 macOS Sequoia 15.6 addresses the following issues. Information about the security content is also available at https://support.apple.com/124149. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Admin Framework Available for: macOS Sequoia Impact: … Read More “APPLE-SA-07-29-2025-3 macOS Sequoia 15.6 – Full Disclosure” »
Author: Joe-W
Posted by Apple Product Security via Fulldisclosure on Jul 29 APPLE-SA-07-29-2025-4 macOS Sonoma 14.7.7 macOS Sonoma 14.7.7 addresses the following issues. Information about the security content is also available at https://support.apple.com/124150. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Admin Framework Available for: macOS Sonoma Impact: … Read More “APPLE-SA-07-29-2025-4 macOS Sonoma 14.7.7 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Jul 29 APPLE-SA-07-29-2025-5 macOS Ventura 13.7.7 macOS Ventura 13.7.7 addresses the following issues. Information about the security content is also available at https://support.apple.com/124151. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Admin Framework Available for: macOS Ventura Impact: … Read More “APPLE-SA-07-29-2025-5 macOS Ventura 13.7.7 – Full Disclosure” »
Posted by Egidio Romano on Jul 29 —————————————————————————- Invision Community <= 4.7.20 (calendar/view.php) SQL Injection Vulnerability —————————————————————————- [-] Software Link: https://invisioncommunity.com [-] Affected Versions: Certain 4.x versions before 4.7.21. [-] Vulnerability Description: The vulnerability is located within the… – Read More – Full Disclosure
Posted by Apple Product Security via Fulldisclosure on Jul 29 APPLE-SA-07-29-2025-1 iOS 18.6 and iPadOS 18.6 iOS 18.6 and iPadOS 18.6 addresses the following issues. Information about the security content is also available at https://support.apple.com/124147. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Accessibility Available for: … Read More “APPLE-SA-07-29-2025-1 iOS 18.6 and iPadOS 18.6 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Jul 29 APPLE-SA-07-29-2025-2 iPadOS 17.7.9 iPadOS 17.7.9 addresses the following issues. Information about the security content is also available at https://support.apple.com/124148. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Accessibility Available for: iPad Pro 12.9-inch 2nd generation, iPad … Read More “APPLE-SA-07-29-2025-2 iPadOS 17.7.9 – Full Disclosure” »
Posted by Marcus Krueppel on Jul 29 ================== Overview ================== TL;DR: Using the low-privilege “admin” user account via SSH on the IoT device “USB-Server-LXL” [1], it is possible to modify the script /etc/init.d/lighttpd which is executed by root upon restart, leading to arbitrary code execution with root privileges. CVE: CVE-2025-52361 Suggested CVSS vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N … Read More “AK-Nord USB-Server-LXL privilege escalation and code execution (CVE-2025-52361) – Full Disclosure” »
Posted by Egidio Romano on Jul 29 —————————————————————— SugarCRM <= 14.0.0 (css/preview) LESS Code Injection Vulnerability —————————————————————— [-] Software Link: https://www.sugarcrm.com [-] Affected Versions: All commercial versions before 13.0.4 and 14.0.1. [-] Vulnerability Description: User input passed through GET parameters to the /css/preview REST API endpoint is not… – Read More – Full Disclosure
Posted by Andrey Stoykov on Jul 29 # Exploit Title: Stored XSS “Edit Header” Functionality – seotoasterv2.5.0 # Date: 07/2025 # Exploit Author: Andrey Stoykov # Version: 2.5.0 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ Stored XSS “Edit Header” Functionality #1: Steps to Reproduce: Login as admin user and visit “News” Click on … Read More “Stored XSS “Edit Header” Functionality – seotoasterv2.5.0 – Full Disclosure” »
Posted by Andrey Stoykov on Jul 29 # Exploit Title: Open Redirect “Login Page” Functionality – seotoasterv2.5.0 # Date: 07/2025 # Exploit Author: Andrey Stoykov # Version: 2.5.0 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ Open Redirect “Login Page” Functionality #1: Steps to Reproduce Login to the application and then add the Referer … Read More “Open Redirect “Login Page” Functionality – seotoasterv2.5.0 – Full Disclosure” »
Posted by Andrey Stoykov on Jul 29 # Exploit Title: Stored XSS “Create Page” Functionality – seotoasterv2.5.0 # Date: 07/2025 # Exploit Author: Andrey Stoykov # Version: 2.5.0 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ Stored XSS “Create Page” Functionality #1: Steps to Reproduce 1. Login with admin and visit “Pages” > “Create … Read More “Stored XSS “Create Page” Functionality – seotoasterv2.5.0 – Full Disclosure” »
Posted by Andrey Stoykov on Jul 29 # Exploit Title: Stored XSS “Edit General Info” Functionality – seotoasterv2.5.0 # Date: 07/2025 # Exploit Author: Andrey Stoykov # Version: 2.5.0 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ Stored XSS “Edit General Info” Functionality #3: Steps to Reproduce 1. Login with admin and visit “Website … Read More “Stored XSS “Edit General Info” Functionality – seotoasterv2.5.0 – Full Disclosure” »
Posted by Palula Brasil on Jul 29 The following snippet in the text is associated to the wrong CVE number: 2.2 Possibility of injecting JavaScript code into the name of the visiting network (XSS) – CVE-2025-26064 The correct CVE number for item 2.2 is CVE-2025-26065. – Read More – Full Disclosure
Invision Community <= 5.0.7 (oauth/callback) Reflected Cross-Site Scripting Vulnerability – Full Disclosure
Posted by Egidio Romano on Jul 29 —————————————————————————————– Invision Community <= 5.0.7 (oauth/callback) Reflected Cross-Site Scripting Vulnerability —————————————————————————————– [-] Software Link: https://invisioncommunity.com [-] Affected Versions: Certain 4.x versions before 4.7.21. All 5.x versions before 5.0.8. [-] Vulnerability Description:… – Read More – Full Disclosure
Posted by Sanjay Singh on Jul 29 Hello Full Disclosure community, I’m sharing details of a recently assigned CVE affecting a widely used open‑source School Management System (PHP/MySQL). ——————————————– CVE ID: CVE‑2025‑52187 Vulnerability Type: Stored Cross‑Site Scripting (XSS) Attack Vector: Remote Discoverer: Sanjay Singh Vendor Repository: https://github.com/GetProjectsIdea/Create-School-Management-System-with-PHP-MySQL Version… – Read More – Full Disclosure
The post Minnesota governor activates National Guard amid St. Paul cyberattack appeared first on CyberScoop. – Read More – CyberScoop
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.5 ATTENTION: Exploitable remotely Vendor: Samsung Equipment: HVAC DMS Vulnerabilities: Execution After Redirect (EAR), Deserialization of Untrusted Data, Absolute Path Traversal, Use of Potentially Dangerous Function, Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’), Relative Path Traversal 2. RISK EVALUATION Successful exploitation of these vulnerabilities … Read More “Samsung HVAC DMS – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.4 ATTENTION: Low attack complexity Vendor: Delta Electronics Equipment: DTN Soft Vulnerability: Deserialization of Untrusted Data 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to use a specially crafted project file to execute arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Delta … Read More “Delta Electronics DTN Soft – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.1 ATTENTION: Low attack complexity Vendor: National Instruments Equipment: LabVIEW Vulnerabilities: Improper Restriction of Operations within the Bounds of a Memory Buffer 2. RISK EVALUATION Successful exploitation of these vulnerabilities could lead to the execution of arbitrary code on affected installations of LabVIEW, which could result in invalid … Read More “National Instruments LabVIEW – All CISA Advisories” »
CISA says it will release telecom security report sought by Sen. Wyden to lift hold on Plankey nomination – CyberScoop
Sean Plankey’s path to leading the Cybersecurity and Infrastructure Security Agency might have one obstacle set to be cleared for removal. With the Senate Homeland Security and Governmental Affairs Committee scheduled to hold a vote on his nomination for CISA director Wednesday, the next and final step for Plankey pending approval from the panel would … Read More “CISA says it will release telecom security report sought by Sen. Wyden to lift hold on Plankey nomination – CyberScoop” »
CISA released Microsegmentation in Zero Trust, Part One: Introduction and Planning as part of its ongoing efforts to support Federal Civilian Executive Branch (FCEB) agencies implementing zero trust architectures (ZTAs). This guidance provides a high-level overview of microsegmentation, focusing on its key concepts, associated challenges and potential benefits, and includes recommended actions to modernize network … Read More “CISA Releases Part One of Zero Trust Microsegmentation Guidance – All CISA Advisories” »
New Choicejacking Attack Steals Data from Phones via Public Chargers – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Choicejacking is a new USB attack that tricks phones into sharing data at public charging stations, bypassing security prompts in milliseconds. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Allianz Life Data Breach Hits 1.4 Million Customers – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Allianz Life Insurance confirms a July 2025 data breach impacting 1.4 million customers, financial pros and employees. Learn how social engineering exploited a third-party CRM, the hallmarks of Scattered Spider tactics, and the broader risks of supply chain vulnerabilities. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Some of Orange’s professional and consumer services may be disrupted for a few days because of the cyber incident – Read More –
PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain – The Hacker News
The maintainers of the Python Package Index (PyPI) repository have issued a warning about an ongoing phishing attack that’s targeting users in an attempt to redirect them to fake PyPI sites. The attack involves sending email messages bearing the subject line “[PyPI] Email verification” that are sent from the email address noreply@pypj[.]org (note that the … Read More “PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain – The Hacker News” »
Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44 – The Hacker News
Cybersecurity researchers have disclosed a now-patched critical security flaw in a popular vibe coding platform called Base44 that could allow unauthorized access to private applications built by its users. “The vulnerability we discovered was remarkably simple to exploit — by providing only a non-secret app_id value to undocumented registration and email verification endpoints, an attacker … Read More “Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44 – The Hacker News” »
200,000 WordPress websites at risk of being hijacked due to vulnerable Post SMTP plugin – Graham Cluley
Over 200,000 websites running a vulnerable version of a popular WordPress plugin could be at risk of being hijacked by hackers. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
In episode 61 of The AI Fix, a robot called DeREK goes bananas, OpenAI, Google DeepMind, and Anthropic warn we may lose the ability to see what AI is thinking, a dextrous robot changes its own batteries, the USA unveils its AI action plan, and a human beats AI to win the World Coding Championship. … Read More “The AI Fix #61: Replit panics, deletes $1M project; AI gets gold at Math Olympiad – Graham Cluley” »
Flaw in Base44 allowed unauthorized access to private apps, bypassing authentication systems – Read More –
CISA, along with the Federal Bureau of Investigation, Canadian Centre for Cyber Security, Royal Canadian Mounted Police, the Australian Cyber Security Centre’s Australian Signals Directorate, and the Australian Federal Police and National Cyber Security Centre, released an updated joint Cybersecurity Advisory on Scattered Spider—a cybercriminal group targeting commercial facilities sectors and subsectors. This advisory provides … Read More “CISA and Partners Release Updated Advisory on Scattered Spider Group – All CISA Advisories” »
SquareX Discloses Architectural Limitations of Browser DevTools in Debugging Malicious Extensions – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Palo Alto, California, 29th July 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
SAP NetWeaver Vulnerability Used in Auto-Color Malware Attack on US Firm – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Darktrace uncovers the first exploit of a critical SAP NetWeaver vulnerability (CVE-2025-31324) to deploy Auto-Color backdoor malware. Learn how this evasive Linux RAT targets systems for remote code execution and how AI-powered defence thwarts multi-stage attacks. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A newly emerged ransomware-as-a-service (RaaS) gang called Chaos is likely made up of former members of the BlackSuit crew, as the latter’s dark web infrastructure has been the subject of a law enforcement seizure. Chaos, which sprang forth in February 2025, is the latest entrant in the ransomware landscape to conduct big-game hunting and double … Read More “Chaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. Victims – The Hacker News” »
Backdoor malware Auto-Color targets Linux systems, exploiting SAP NetWeaver flaw CVE-2025-31324 – Read More –
In the dependent world on digital infrastructure, cyber security has become the cornerstone of organizational flexibility. Nevertheless, despite the… The post Cybersecurity Is Broken And Zero Trust Alone Won’t Fix It appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Hackers are actively exploiting two critical flaws in Cisco Identity Services Engine, said the US Cybersecurity and Infrastructure Security Agency – Read More –
The federal government has applied for forfeiture of the funds, which were seized by FBI Dallas in April 2025 – Read More –
How Scattered Spider Used Fake Calls to Breach Clorox via Cognizant – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Specops Software’s analysis reveals how Scattered Spider’s persistent help desk exploitation cost Clorox $400 million. Understand the August 2023 breach, its operational disruption, and critical steps organisations must take to protect against similar social engineering threats. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
React conquered XSS? Think again. That’s the reality facing JavaScript developers in 2025, where attackers have quietly evolved their injection techniques to exploit everything from prototype pollution to AI-generated code, bypassing the very frameworks designed to keep applications secure. Full 47-page guide with framework-specific defenses (PDF, free). JavaScript conquered the web, but with – Read … Read More “Why React Didn’t Kill XSS: The New JavaScript Injection Playbook – The Hacker News” »
Cybercriminals Use Fake Apps to Steal Data and Blackmail Users Across Asia’s Mobile Networks – The Hacker News
Cybersecurity researchers have discovered a new, large-scale mobile malware campaign that’s targeting Android and iOS platforms with fake dating, social networking, cloud storage, and car service apps to steal sensitive personal data. The cross-platform threat has been codenamed SarangTrap by Zimperium zLabs. Users in South Korea appear to be the primary focus. “This extensive campaign … Read More “Cybercriminals Use Fake Apps to Steal Data and Blackmail Users Across Asia’s Mobile Networks – The Hacker News” »
Until recently, the cyber attacker methodology behind the biggest breaches of the last decade or so has been pretty consistent: Compromise an endpoint via software exploit, or social engineering a user to run malware on their device; Find ways to move laterally inside the network and compromise privileged identities; Repeat as needed until you can … Read More “How the Browser Became the Main Cyber Battleground – The Hacker News” »
Comment Now! NIST IR 8374, Ransomware Risk Management: A Cybersecurity Framework 2.0 Community Profile – News and Events Feed by Topic
Earlier this year, the NIST National Cybersecurity Center of Excellence published an initial public draft of NIST Interagency Report (NIST IR) 8374 Revision 1, Ransomware Risk Management: A Cybersecurity Framework 2.0 Community Profile. The project – Read More – News and Events Feed by Topic
A Scottish charity has been fined £18,000 for systematic data protection failings – Read More –
Two pro-Ukraine hacktivists have claimed responsibility for a destructive attack on Aeroflot – Read More –
CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitation – The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a high-severity security vulnerability impacting PaperCutNG/MF print management software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability, tracked as CVE-2023-2533 (CVSS score: 8.4), is a cross-site request forgery (CSRF) bug that could – Read More … Read More “CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitation – The Hacker News” »
KL-001-2025-012: Xorux XorMon-NG Read Only User Export Device Configuration Exposing Sensitive Information – Full Disclosure
Posted by KoreLogic Disclosures via Fulldisclosure on Jul 28 KL-001-2025-012: Xorux XorMon-NG Read Only User Export Device Configuration Exposing Sensitive Information Title: Xorux XorMon-NG Read Only User Export Device Configuration Exposing Sensitive Information Advisory ID: KL-001-2025-012 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-012.txt 1. Vulnerability Details Affected Vendor: Xorux Affected Product: XorMon-NG … – … Read More “KL-001-2025-012: Xorux XorMon-NG Read Only User Export Device Configuration Exposing Sensitive Information – Full Disclosure” »
KL-001-2025-013: Xorux XorMon-NG Web Application Privilege Escalation to Administrator – Full Disclosure
Posted by KoreLogic Disclosures via Fulldisclosure on Jul 28 KL-001-2025-013: Xorux XorMon-NG Web Application Privilege Escalation to Administrator Title: Xorux XorMon-NG Web Application Privilege Escalation to Administrator Advisory ID: KL-001-2025-013 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-013.txt 1. Vulnerability Details Affected Vendor: Xorux Affected Product: XorMon-NG Affected Version: 1.8 and prior… – Read … Read More “KL-001-2025-013: Xorux XorMon-NG Web Application Privilege Escalation to Administrator – Full Disclosure” »
Posted by KoreLogic Disclosures via Fulldisclosure on Jul 28 KL-001-2025-014: Xorux LPAR2RRD Read Only User Denial of Service Title: Xorux LPAR2RRD Read Only User Denial of Service Advisory ID: KL-001-2025-014 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-014.txt 1. Vulnerability Details Affected Vendor: Xorux Affected Product: LPAR2RRD Affected Version: 8.04 and prior … Read More “KL-001-2025-014: Xorux LPAR2RRD Read Only User Denial of Service – Full Disclosure” »
KL-001-2025-015: Xorux LPAR2RRD Read Only User Log Download Exposing Sensitive Information – Full Disclosure
Posted by KoreLogic Disclosures via Fulldisclosure on Jul 28 KL-001-2025-015: Xorux LPAR2RRD Read Only User Log Download Exposing Sensitive Information Title: Xorux LPAR2RRD Read Only User Log Download Exposing Sensitive Information Advisory ID: KL-001-2025-015 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-015.txt 1. Vulnerability Details Affected Vendor: Xorux Affected Product: LPAR2RRD Affected Version: … Read More “KL-001-2025-015: Xorux LPAR2RRD Read Only User Log Download Exposing Sensitive Information – Full Disclosure” »
Posted by KoreLogic Disclosures via Fulldisclosure on Jul 28 KL-001-2025-016: Xorux LPAR2RRD File Upload Directory Traversal Title: Xorux LPAR2RRD File Upload Directory Traversal Advisory ID: KL-001-2025-016 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-016.txt 1. Vulnerability Details Affected Vendor: Xorux Affected Product: LPAR2RRD Affected Version: 8.04 and prior Platform: Rocky Linux 8.10 … Read More “KL-001-2025-016: Xorux LPAR2RRD File Upload Directory Traversal – Full Disclosure” »