Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

‘Wasn’t built right from the start’ — Musk’s xAI starts all over again

AI mental illness lawyer warns of risk of mass casualties

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA adds four important vulnerabilities to the KEV catalog through aggressive exploitation
Identity

CISA adds four important vulnerabilities to the KEV catalog through aggressive exploitation

userBy userJuly 8, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 8, 2025Ravi LakshmananCyber ​​Attacks/Vulnerability

The US Cybersecurity and Infrastructure Security Agency (CISA) on Monday added four security flaws to its known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.

Here’s a list of defects –

CVE-2014-3931 (CVSS score: 9.8) – Multi-router-looking glass (MRLG) buffer overflow vulnerability that allows remote attackers to cause arbitrary memory writes and memory corruption CVE-2016-10033 (CVSS score: 9.8) Application or as a result, Denial of Service (DOS) Condition CVE-2019-5418 (CVSS score: 7.5) – Ruby on Rails action view path traversal vulnerability CVE-2019-9621 (CVSS: 7.5SS: 7.5SS: 7.5SS: 7.5SS: 7.5SS: 7.5SS: 7.5SS: 7.5) Zimbra collaboration suite that can lead to unauthorized access to internal resources and remote code execution

Currently, there are no public reports on how the first three vulnerabilities are exploited in actual attacks. Meanwhile, the abuse of CVE-2019-9621 was attributed to a dropping webshell and cobalt strike by Trend Micro on a Chinese-related threat actor known as Earthluska in September 2023.

Cybersecurity

In light of active exploitation, a Federal Private Enforcement Division (FCEB) agency is recommended to apply necessary updates to ensure the network by July 28, 2025.

Technical details for Citrix Bleed 2

The development has released a technical analysis of key security flaws in WatchTowr Labs and Horizon3.CITRIX Netscaler ADC (CVE-2025-5777aka Citrix Bleed 2).

“In the wild, we see active exploitation of both CVE-2025-5777 and CVE-2025-6543,” Watchtwal CEO Benjamin Harris told Hacker News. “The vulnerability allows memory reading. We believe an attacker is using it to read sensitive information (for example, information sent within an HTTP request is processed in memory), credentials, valid Citrix session tokens, and more.”

The findings show that a login request can be sent to the “/p/u/doauthentication.do” endpoint, which can cause it to reflect the login value that the response user has suspended (and other endpoints) regardless of success or failure.

Note that Horizon3.AI can use the vulnerability to leak around 127 bytes of data via specially created HTTP requests using “login=”, which is modified without equal signs or values.

WatchTowr explained that it has the drawback of being attributed to the use of the SNPRINTF function, along with a format string containing the “%.*S” format.

“The %.*s format tells you snprintf: ‘print it on n characters or stop at the first null byte (\\ 0) – either the first.” That null byte will eventually appear somewhere in memory, so the leak won’t run indefinitely, but you get a small number of bytes with each call,” the company said.

“So, every time you press that endpoint without = it pulls more initialized stack data into the response. It may repeat enough and ultimately end up landing on something worthwhile.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWill the Reconnected Community Program survive Trump?
Next Article Florida home insurance companies disproportionately drop low-income households
user
  • Website

Related Posts

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

March 14, 2026

Chinese hackers target Southeast Asian militaries with AppleChris and MemFun malware

March 13, 2026

Meta to end Instagram’s end-to-end encrypted chat support starting May 2026

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

‘Wasn’t built right from the start’ — Musk’s xAI starts all over again

AI mental illness lawyer warns of risk of mass casualties

Digg lays off staff and closes app as company reorganizes

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.