Aggregator
Webinar | The Platform Myth—Escaping the "Stitched-Together" Security Stack
7 hours 18 minutes ago
AI Governance Unlocks Speed, Not Bureaucracy
7 hours 18 minutes ago
ServiceNow's Neeraj Jain on Risk Mitigation and Real-Time Data Access for AI Agents
Enterprises that embed governance from intake to deployment scale AI faster than those that bolt it on afterward. Clear frameworks mitigate risk, ensure compliance and increase operational efficiency, says Neeraj Jain, director of product management, hyperscalers and multi-cloud at ServiceNow.
Enterprises that embed governance from intake to deployment scale AI faster than those that bolt it on afterward. Clear frameworks mitigate risk, ensure compliance and increase operational efficiency, says Neeraj Jain, director of product management, hyperscalers and multi-cloud at ServiceNow.
Youth Sports, NCAA Insurance Claims Potentially Hacked
7 hours 18 minutes ago
National Accident Health Says Breach Exposed Medical Info of 181,000 People
A Maine-based third-party administrator that handles healthcare claims involving day care centers, youth sports and NCAA athlete accidents is notifying more than 181,000 individuals that their medical information and personal identifiers may have been accessed or stolen in a hacking incident.
A Maine-based third-party administrator that handles healthcare claims involving day care centers, youth sports and NCAA athlete accidents is notifying more than 181,000 individuals that their medical information and personal identifiers may have been accessed or stolen in a hacking incident.
Cyderes Bets on Lucidum to Drive AI-Backed Identity Security
7 hours 18 minutes ago
Cyderes Aims to Fuse Identity, AI and Risk Signals in One Platform With Lucidum Buy
Cyderes has acquired Lucidum to expand its identity threat detection capabilities. Lucidum’s unique tagging and data integration will strengthen Cyderes' AI engine, enabling earlier detection of threats and human risk-based response by unifying off-SIEM telemetry with identity data.
Cyderes has acquired Lucidum to expand its identity threat detection capabilities. Lucidum’s unique tagging and data integration will strengthen Cyderes' AI engine, enabling earlier detection of threats and human risk-based response by unifying off-SIEM telemetry with identity data.
Russia's GRU Tied to Critical Infrastructure Cloud Breaches
7 hours 18 minutes ago
Misconfigured Customer Network Edge Devices' Under Fire, Warn Researchers
Misconfigured edge devices hosted in the cloud are giving nation-state hackers carte blanche to access Western critical infrastructure, warn threat intelligence experts at Amazon, who tied exploits of AWS customers' device administrator portals to Russia's GRU military intelligence agency.
Misconfigured edge devices hosted in the cloud are giving nation-state hackers carte blanche to access Western critical infrastructure, warn threat intelligence experts at Amazon, who tied exploits of AWS customers' device administrator portals to Russia's GRU military intelligence agency.
Submit #708323: xiweicheng TMS v2.28.0 Cross Site Scripting [Duplicate]
7 hours 21 minutes ago
Submit #708323 / VDB-249676
red0_ha1yu
Submit #708322: xiweicheng TMS v2.28.0 Cross Site Scripting [Accepted]
7 hours 21 minutes ago
Submit #708322 / VDB-336939
red0_ha1yu
CVE-2025-14282 | Dropbear 2025.89 Unix Domain Socket improper authentication
7 hours 23 minutes ago
A vulnerability classified as critical has been found in Dropbear 2025.89. The impacted element is an unknown function of the component Unix Domain Socket Handler. This manipulation causes improper authentication.
This vulnerability is tracked as CVE-2025-14282. The attack is restricted to local execution. Moreover, an exploit is present.
vuldb.com
CVE-2025-14399 | Download Plugins and Themes in ZIP from Dashboard Plugin download_plugin_bulk cross-site request forgery
7 hours 24 minutes ago
A vulnerability described as problematic has been identified in Download Plugins and Themes in ZIP from Dashboard Plugin up to 1.9.6 on WordPress. The affected element is the function download_plugin_bulk. The manipulation results in cross-site request forgery.
This vulnerability is identified as CVE-2025-14399. The attack can be executed remotely. There is not any exploit available.
vuldb.com
CVE-2025-12496 | Dylan James Zephyr Project Manager Plugin up to 3.3.203 on WordPress allow_url_fopen File server-side request forgery
7 hours 24 minutes ago
A vulnerability marked as critical has been reported in Dylan James Zephyr Project Manager Plugin up to 3.3.203 on WordPress. Impacted is the function allow_url_fopen. The manipulation of the argument File leads to server-side request forgery.
This vulnerability is referenced as CVE-2025-12496. Remote exploitation of the attack is possible. No exploit is available.
vuldb.com
CVE-2025-14154 | Better Messages Plugin up to 2.10.2 on WordPress cross site scripting
7 hours 24 minutes ago
A vulnerability labeled as problematic has been found in Better Messages Plugin up to 2.10.2 on WordPress. This issue affects some unknown processing. Executing manipulation can lead to cross site scripting.
The identification of this vulnerability is CVE-2025-14154. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2025-11924 | Ninja Forms Plugin up to 3.13.1/3.13.2 on WordPress REST Endpoint resource injection
7 hours 24 minutes ago
A vulnerability identified as problematic has been detected in Ninja Forms Plugin up to 3.13.1/3.13.2 on WordPress. This vulnerability affects unknown code of the component REST Endpoint. Performing manipulation results in improper control of resource identifiers.
This vulnerability was named CVE-2025-11924. The attack may be initiated remotely. There is no available exploit.
vuldb.com
CVE-2025-14061 | Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker Plugin gdpr_delete_policy_data authorization
7 hours 25 minutes ago
A vulnerability categorized as critical has been discovered in Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker Plugin up to 4.0.7 on WordPress. This affects the function gdpr_delete_policy_data. Such manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2025-14061. The attack can be launched remotely. No exploit exists.
vuldb.com
CVE-2025-13880 | WP Social Ninja Plugin up to 4.0.1 on WordPress Setting authorization
7 hours 25 minutes ago
A vulnerability was found in WP Social Ninja Plugin up to 4.0.1 on WordPress. It has been rated as critical. Affected by this issue is some unknown functionality of the component Setting Handler. This manipulation causes missing authorization.
This vulnerability is handled as CVE-2025-13880. The attack can be initiated remotely. There is not any exploit available.
vuldb.com
CVE-2025-13750 | Converter for Media Plugin up to 6.3.2 on WordPress REST Endpoint regenerate-attachment authorization
7 hours 25 minutes ago
A vulnerability was found in Converter for Media Plugin up to 6.3.2 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /webp-converter/v1/regenerate-attachment of the component REST Endpoint. The manipulation results in missing authorization.
This vulnerability is known as CVE-2025-13750. It is possible to launch the attack remotely. No exploit is available.
vuldb.com
CVE-2023-53897 | Rukovoditel 3.4.1 Project Task Comment cross site scripting (Exploit 51548 / EDB-51548)
7 hours 27 minutes ago
A vulnerability was found in Rukovoditel 3.4.1. It has been classified as problematic. Affected is an unknown function of the component Project Task Comment Handler. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2023-53897. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2025-33210 | NVIDIA Isaac Lab deserialization
7 hours 27 minutes ago
A vulnerability was found in NVIDIA Isaac Lab and classified as very critical. This impacts an unknown function. Executing manipulation can lead to deserialization.
This vulnerability appears as CVE-2025-33210. The attack may be performed from remote. There is no available exploit.
vuldb.com
CVE-2023-53901 | WBCE CMS 1.6.1 redirect (Exploit 51566 / EDB-51566)
7 hours 27 minutes ago
A vulnerability has been found in WBCE CMS 1.6.1 and classified as problematic. This affects an unknown function. Performing manipulation results in open redirect.
This vulnerability is reported as CVE-2023-53901. The attack is possible to be carried out remotely. Moreover, an exploit is present.
vuldb.com
CVE-2025-14553 | TP-Link Tapo C210 up to 3.1.5/3.1.600 on iOS/Android API information disclosure
7 hours 28 minutes ago
A vulnerability, which was classified as problematic, was found in TP-Link Tapo C210 up to 3.1.5/3.1.600 on iOS/Android. The impacted element is an unknown function of the component API. Such manipulation leads to information disclosure.
This vulnerability is documented as CVE-2025-14553. The attack requires being on the local network. There is not any exploit available.
You should upgrade the affected component.
vuldb.com