Logo
  • NEWS
  • NVD
  • EXPLOITS
  • SECURITY
    • NCSC
    • SECURELIST
    • US-CERT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

  • The soft underbelly of space isn’t in orbit, it’s on the ground

    In this Help Net Security interview, Øystein Thorvaldsen, CISO at KSAT, discusses how adversaries view the ground segment as the practical …

    18 December 2025
    CISO, Features, IT, News
  • Privacy risks sit inside the ads that fill your social media feed

    Regulatory limits on explicit targeting have not stopped algorithmic profiling on the web. Ad optimization systems still adapt which ads …

    18 December 2025
    Facebook, Features, IT, LLMs, Privacy
  • CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical flaw impacting ASUS Live Update to its Known …

    18 December 2025
    Active, After, Critical, Evidence, Exploitation
  • Should AI access be treated as a civil right across generations?

    AI use is expanding faster than the infrastructure that supports it, and that gap is starting to matter for security, resilience, and …

    18 December 2025
    AI, IT, News
  • What cybersecurity leaders are reading to stay ahead

    If you’re looking for holiday gift ideas, books remain one of the simplest ways to spark curiosity and support someone’s growth. …

    18 December 2025
    IT, News
  • Linux Kernel Rust Code Sees Its First CVE Vulnerability

    Longtime Linux developer Greg Kroah-Hartman announced that the Linux kernel has received its first CVE tied to Rust code. Phoronix …

    18 December 2025
    Codes, CVE, IT, Open Source OS, Programming
  • Smashing Security podcast #448: The Kindle that got pwned

    Think your Kindle is harmless? Think …

    18 December 2025
    Amazon, Ireland, Malware, Podcasts, Ransomware
  • France Arrests 22 Year Old After Hack of Interior Ministry Systems

    France is now dealing with one of its most serious public sector cybersecurity incidents in recent years, after the Interior Ministry …

    18 December 2025
    After, Arrests, Hacks, Interior, Old
  • CVE-2025-68463 – Bio.Entrez in Biopython through 186 allows doctype …

    Bio.Entrez in Biopython through 186 allows doctype …

    18 December 2025
    NVD
  • CVE-2025-68462 – Freedombox before 25.17.1 does not set proper permissions for the backups-data directory, …

    Freedombox before 25.17.1 does not set proper permissions for the backups-data directory, allowing the reading of dump files of …

    18 December 2025
    NVD
  • CVE-2025-68459 – RG – AP180, Indoor Wall Plate Wireless AP AP180 series provided by Ruijie Networks Co., …

    RG – AP180, Indoor Wall Plate Wireless AP AP180 series provided by Ruijie Networks Co., Ltd. contain an OS command injection vulnerability. …

    18 December 2025
    NVD
  • CVE-2025-47387 – Memory Corruption when processing IOCTLs for JPEG data without …

    Memory Corruption when processing IOCTLs for JPEG data without …

    18 December 2025
    NVD
{"loadingDistance":1200,"stickyPosts":[],"nextPageLink":"https://itts.at/page/2","queryId":0}

●●●

CookieFree

NVD

  • CVE-2025-14856 – A security vulnerability has been detected in y_project RuoYi up to 4.8.1. The affected …18 December 2025
  • CVE-2025-14202 – A vulnerability in the file upload at bookmark + asset rendering pipeline allows an …18 December 2025
  • CVE-2025-14841 – A flaw has been found in OFFIS DCMTK up to 3.6.9. The impacted element is the function …18 December 2025
  • CVE-2025-14837 – A vulnerability has been found in ZZCMS 2025. Affected by this issue is the function …18 December 2025
  • CVE-2025-68463 – Bio.Entrez in Biopython through 186 allows doctype …18 December 2025

EXPLOITS

  • Summar Employee Portal 3.98.0 – Authenticated SQL Injection16 December 2025
  • esm-dev 136 – Path Traversal16 December 2025
  • Pluck 4.7.7-dev2 – PHP Code Execution8 December 2025
  • Django 5.1.13 – SQL Injection3 December 2025
  • phpMyFAQ 2.9.8 – Cross-Site Request Forgery (CSRF)3 December 2025

SECURELIST

  • Operation ForumTroll continues: Russian political scientists targeted using plagiarism rep17 December 2025
  • God Mode On: how we attacked a vehicle’s head unit modem16 December 2025
  • Frogblight threatens you with a court case: a new Android banker targets Turkish users15 December 2025
  • Following the digital trail: what happens to data stolen in a phishing attack12 December 2025
  • Turn me on, turn me off: Zigbee assessment in industrial environments12 December 2025


Copyright © 2025 ITTS | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.