
|
Today's report
|
|
Source: CVE Trend
UNRATED CVE‑2025‑20282
Published: 2025-06-25 Updated: 2025-06-26
🥕🥕🥕⚪⚪⚪⚪⚪⚪⚪ (32%)A vulnerability in an internal API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device and then execute those files on the underlying operating system as root..This vulnerability is due a lack of file ..
|
Source: NIST
HIGH
CVE‑2025‑6381
Published: 2025-06-28 Updated: 2025-06-28
The BeeTeam368 Extensions plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.3.4 via the handle_remove_temp_file() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory. This vulnerability can be used to delete the wp-config.php file, which can be leveraged into a site takeover.
HIGH
CVE‑2025‑6379
Published: 2025-06-28 Updated: 2025-06-28
The BeeTeam368 Extensions Pro plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.3.4 via the handle_live_fn() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory. This vulnerability can be used to delete the wp-config.php file, which can be leveraged into a site takeover.
|
|
OneClik APT campaign targets energy sector with stealthy backdoors
A OneClik campaign, likely carried out by China-linked actor, targets energy sectors using stealthy ClickOnce and Golang backdoors. Trellix cybersecurity researchers uncovered a new APT malware campaign, OneClik, targeting the energy, oil, and gas [...] (Security Affairs)
|
|
US Falling Behind China in Exploit Production
Cyber operations have become critical to national security, but the United States has fallen behind in one significant area -- exploit production -- while China has built up a significant lead. (darkreading)
|
|
Source: Hybrid Analysis
Source: Hybrid Analysis
|
|