Trump’s DoD CISO pick previously faced security clearance suspension
Trump’s DoD CISO pick previously faced security clearance suspension

Trump’s DoD CISO pick previously faced security clearance suspension

2025-02-19 22:00

Hey, at least Katie Arrington brings a solid resume Donald Trump's nominee for a critical...

CISA and FBI: Ghost ransomware breached orgs in 70 countries

CISA and FBI: Ghost ransomware breached orgs in 70 countries

2025-02-19 20:55

CISA and the FBI said attackers deploying Ghost ransomware have breached victims from multiple...

Check out this free automated tool that hunts for exposed AWS secrets in public repos

Check out this free automated tool that hunts for exposed AWS secrets in public repos

2025-02-19 20:45

You can find out if your GitHub codebase is leaking keys ... but so can miscreants A free...

Phishing attack hides JavaScript using invisible Unicode trick

Phishing attack hides JavaScript using invisible Unicode trick

2025-02-19 20:14

A new JavaScript obfuscation method utilizing invisible Unicode characters to represent binary...

New FrigidStealer infostealer infects Macs via fake browser updates

New FrigidStealer infostealer infects Macs via fake browser updates

2025-02-19 17:42

The FakeUpdate malware campaigns are increasingly becoming muddled, with two additional...

Australian fertility services giant Genea hit by security breach

Australian fertility services giant Genea hit by security breach

2025-02-19 17:40

​Genea, one of Australia's largest fertility services providers, disclosed that unknown...

Hackers Exploit Signal's Linked Devices Feature to Hijack Accounts via Malicious QR Codes

Hackers Exploit Signal's Linked Devices Feature to Hijack Accounts via Malicious QR Codes

2025-02-19 16:59

Multiple Russia-aligned threat actors have been observed targeting individuals of interest via...

Vulnerabilities by Risk level (Last 12 months)

Risk level Last 12 months #
Critical 2335
High 6962
Medium 10388
Low 381

Vulnerabilities by Vendor (Last 12 months)

Vendor Last 12 months #
Linux 2875
Google 633
Apple 554
Microsoft 523
Adobe 481

Latest Vulnerabilities

  • CVE-2024-13508

    6.1

    The Booking Package plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the locale parameter in all versions up to, and including, 1.6.72 due to insufficient input...

    network
    low complexity
    CWE-79
  • CVE-2024-13743

    6.4

    The Wonder Video Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wonderplugin_video shortcode in all versions up to, and including, 2.2 due to insufficient...

    network
    low complexity
    CWE-79
  • CVE-2024-45775

    5.2

    A flaw was found in grub2 where the grub_extcmd_dispatcher() function calls grub_arg_list_alloc() to allocate memory for the grub's argument list. However, it fails to check in case the memory...

    local
    high complexity
    CWE-252
  • CVE-2024-45776

    6.7

    When reading the language .mo file in grub_mofile_open(), grub2 fails to verify an integer overflow when allocating its internal buffer. A crafted .mo file may lead the buffer size calculation to...

    local
    low complexity
    CWE-787
  • CVE-2024-45781

    6.7

    A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap...

    local
    low complexity

Latest Critical Vulnerabilities

  • CVE-2024-12860

    9.8

    The CarSpot – Dealership Wordpress Classified Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.4.3. This is due to the...

    network
    low complexity
    CWE-620
    critical
  • CVE-2024-13725

    9.8

    The Keap Official Opt-in Forms plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.0.1 via the service parameter. This makes it possible for...

    network
    low complexity
    CWE-22
    critical
  • CVE-2025-1387

    9.8

    Orca HCM from LEARNING DIGITAL has an Improper Authentication vulnerability, allowing unauthenticated remote attackers to log in to the system as any user.

    network
    low complexity
    critical
  • CVE-2024-12562

    9.8

    The s2Member Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 241216 via deserialization of untrusted input from the 's2member_pro_remote_op'...

    network
    low complexity
    CWE-502
    critical
  • CVE-2024-13513

    9.8

    The Oliver POS – A WooCommerce Point of Sale (POS) plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.4.2.3 via the logging functionality....

    network
    low complexity
    CWE-862
    critical
  • CVE-2024-13152

    10.0

    Authorization Bypass Through User-Controlled SQL Primary Key vulnerability in BSS Software Mobuy Online Machinery Monitoring Panel allows SQL Injection.This issue affects Mobuy Online Machinery...

    network
    low complexity
    CWE-566
    critical
  • CVE-2024-13182

    9.8

    The WP Directorybox Manager plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.5. This is due to incorrect authentication in the...

    network
    low complexity
    CWE-288
    critical
  • CVE-2024-10763

    9.8

    The Campress theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.35 via the 'campress_woocommerce_get_ajax_products' function. This makes it possible...

    network
    low complexity
    CWE-22
    critical