Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Moonvalley’s “ethical” AI video model for filmmakers has been released

Malicious Pull Request Targets Over 6,000 Developers Target via Vulnerable Escode vs Code Extensions

Why this LA-based VC company was an early investor in Slate Auto

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA adds four important vulnerabilities to the KEV catalog through aggressive exploitation
Identity

CISA adds four important vulnerabilities to the KEV catalog through aggressive exploitation

userBy userJuly 8, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 8, 2025Ravi LakshmananCyber ​​Attacks/Vulnerability

The US Cybersecurity and Infrastructure Security Agency (CISA) on Monday added four security flaws to its known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.

Here’s a list of defects –

CVE-2014-3931 (CVSS score: 9.8) – Multi-router-looking glass (MRLG) buffer overflow vulnerability that allows remote attackers to cause arbitrary memory writes and memory corruption CVE-2016-10033 (CVSS score: 9.8) Application or as a result, Denial of Service (DOS) Condition CVE-2019-5418 (CVSS score: 7.5) – Ruby on Rails action view path traversal vulnerability CVE-2019-9621 (CVSS: 7.5SS: 7.5SS: 7.5SS: 7.5SS: 7.5SS: 7.5SS: 7.5SS: 7.5) Zimbra collaboration suite that can lead to unauthorized access to internal resources and remote code execution

Currently, there are no public reports on how the first three vulnerabilities are exploited in actual attacks. Meanwhile, the abuse of CVE-2019-9621 was attributed to a dropping webshell and cobalt strike by Trend Micro on a Chinese-related threat actor known as Earthluska in September 2023.

Cybersecurity

In light of active exploitation, a Federal Private Enforcement Division (FCEB) agency is recommended to apply necessary updates to ensure the network by July 28, 2025.

Technical details for Citrix Bleed 2

The development has released a technical analysis of key security flaws in WatchTowr Labs and Horizon3.CITRIX Netscaler ADC (CVE-2025-5777aka Citrix Bleed 2).

“In the wild, we see active exploitation of both CVE-2025-5777 and CVE-2025-6543,” Watchtwal CEO Benjamin Harris told Hacker News. “The vulnerability allows memory reading. We believe an attacker is using it to read sensitive information (for example, information sent within an HTTP request is processed in memory), credentials, valid Citrix session tokens, and more.”

The findings show that a login request can be sent to the “/p/u/doauthentication.do” endpoint, which can cause it to reflect the login value that the response user has suspended (and other endpoints) regardless of success or failure.

Note that Horizon3.AI can use the vulnerability to leak around 127 bytes of data via specially created HTTP requests using “login=”, which is modified without equal signs or values.

WatchTowr explained that it has the drawback of being attributed to the use of the SNPRINTF function, along with a format string containing the “%.*S” format.

“The %.*s format tells you snprintf: ‘print it on n characters or stop at the first null byte (\\ 0) – either the first.” That null byte will eventually appear somewhere in memory, so the leak won’t run indefinitely, but you get a small number of bytes with each call,” the company said.

“So, every time you press that endpoint without = it pulls more initialized stack data into the response. It may repeat enough and ultimately end up landing on something worthwhile.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWill the Reconnected Community Program survive Trump?
Next Article Florida home insurance companies disproportionately drop low-income households
user
  • Website

Related Posts

Malicious Pull Request Targets Over 6,000 Developers Target via Vulnerable Escode vs Code Extensions

July 8, 2025

Five ways identity-based attacks are violating retail

July 8, 2025

Rondodox Botnet Exploits TBK DVR and 4 faithful router flaws launch Explaws DDOS attack

July 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Moonvalley’s “ethical” AI video model for filmmakers has been released

Malicious Pull Request Targets Over 6,000 Developers Target via Vulnerable Escode vs Code Extensions

Why this LA-based VC company was an early investor in Slate Auto

UCL research discovers interesting properties of “space ice”

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.