Overview
Description
Statistics
- 1 Post
Fediverse
π CVE-2025-57283 - High (7.8)
The Node.js package browserstack-local 1.5.8 contains a command injection vulnerability. This occurs because the logfile variable is not properly sanitized in lib/Local.js.
π https://www.thehackerwire.com/vulnerability/CVE-2025-57283/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
- Drupal
- Acquia Content Hub
Description
Statistics
- 1 Post
Fediverse
π CVE-2025-14472 - High (8.1)
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Request Forgery.This issue affects Acquia Content Hub: from 0.0.0 before 3.6.4, from 3.7.0 before 3.7.3.
π https://www.thehackerwire.com/vulnerability/CVE-2025-14472/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
Description
Statistics
- 1 Post
Fediverse
π΄ CVE-2025-69517 - Critical (9.8)
An issue in Amidaware Inc Tactical RMM v1.3.1 and before allows a remote attacker to execute arbitrary code via the /api/tacticalrmm/apiv3/views.py component
π https://www.thehackerwire.com/vulnerability/CVE-2025-69517/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
- Global Interactive Design Media Software Inc.
- Content Management System (CMS)
Description
Statistics
- 1 Post
Fediverse
π CVE-2025-7713 - High (7.5)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows XSS Through HTTP Headers.This issue affects Content M...
π https://www.thehackerwire.com/vulnerability/CVE-2025-7713/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
Description
Statistics
- 1 Post
Overview
- Python Software Foundation
- CPython
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post
Fediverse
Unveiling the Weaponized Web Shell EncystPHP
https://www.fortinet.com/blog/threat-research/unveiling-the-weaponized-web-shell-encystphp
FortiGuard Labs has discovered a web shell that we named βEncystPHP.β It
features several advanced capabilities, including remote command execution,
persistence mechanisms, and web shell deployment. Incidents were launched in
early December last year and propagated via exploitation of the FreePBX
vulnerability CVE-2025-64328.
Its malicious activity appears to be associated with the hacker group
INJ3CTOR3, first identified in 2020, which targeted CVE-2019-19006. In 2022,
the threat actor shifted its focus to the Elastix system via CVE-2021-45461.
These incidents begin with the exploitation of a FreePBX vulnerability,
followed by the deployment of a PHP web shell in the target environments. We
assess that this campaign represents recent attack activity and behavior
patterns associated with INJ3CTOR3.
Overview
Description
Statistics
- 1 Post
Fediverse
Unveiling the Weaponized Web Shell EncystPHP
https://www.fortinet.com/blog/threat-research/unveiling-the-weaponized-web-shell-encystphp
FortiGuard Labs has discovered a web shell that we named βEncystPHP.β It
features several advanced capabilities, including remote command execution,
persistence mechanisms, and web shell deployment. Incidents were launched in
early December last year and propagated via exploitation of the FreePBX
vulnerability CVE-2025-64328.
Its malicious activity appears to be associated with the hacker group
INJ3CTOR3, first identified in 2020, which targeted CVE-2019-19006. In 2022,
the threat actor shifted its focus to the Elastix system via CVE-2021-45461.
These incidents begin with the exploitation of a FreePBX vulnerability,
followed by the deployment of a PHP web shell in the target environments. We
assess that this campaign represents recent attack activity and behavior
patterns associated with INJ3CTOR3.
Overview
- Python Software Foundation
- CPython
Description
Statistics
- 1 Post
Overview
- Python Software Foundation
- CPython
Description
Statistics
- 1 Post