X

Vous n'êtes pas connecté

Maroc Maroc - THECYBERTHRONE.IN - A La Une - 04/Dec 10:50

King Addons vulnerability CVE-2025-8489 for Elementor Plugin

A critical security vulnerability, tracked as CVE-2025-8489, has been discovered in the popular King Addons for Elementor WordPress plugin, affecting versions from 24.12.92 through 51.1.14. This vulnerability allows unauthenticated attackers…

Articles similaires

Sorry! Image not available at this time

King Addons flaw lets anyone become WordPress admin

securityaffairs.co - 03/Dec 22:27

Hackers are exploiting a King Addons flaw (CVE-2025-8489) that lets anyone register and instantly gain admin privileges on WordPress sites. Hackers...

Sorry! Image not available at this time

Critical flaw in WordPress add-on for Elementor exploited in attacks

bleepingcomputer.com - 03/Dec 21:31

Attackers are exploiting a critical-severity privilege escalation vulnerability (CVE-2025-8489) in the King Addons for Elementor plugin for WordPress,...

Sorry! Image not available at this time

Critical flaw in WordPress add-on for Elementor exploited in attacks

bleepingcomputer.com - 03/Dec 21:31

Attackers are exploiting a critical-severity privilege escalation vulnerability (CVE-2025-8489) in the King Addons for Elementor plugin for WordPress,...

Sorry! Image not available at this time

Longwatch RCE Vulnerability Let Attackers Execute Remote Code With Elevated Privileges

itsecuritynews.info - 03/Dec 18:32

A critical security vulnerability has been discovered in Industrial Video & Control’s Longwatch video surveillance system, allowing attackers to...

Sorry! Image not available at this time

Longwatch RCE Vulnerability Let Attackers Execute Remote Code With Elevated Privileges

itsecuritynews.info - 03/Dec 18:32

A critical security vulnerability has been discovered in Industrial Video & Control’s Longwatch video surveillance system, allowing attackers to...

Sorry! Image not available at this time

Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

itsecuritynews.info - 03/Dec 19:06

A maximum-severity security flaw has been disclosed in React Server Components (RSC) that, if successfully exploited, could result in remote code...

Sorry! Image not available at this time

Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

itsecuritynews.info - 03/Dec 19:06

A maximum-severity security flaw has been disclosed in React Server Components (RSC) that, if successfully exploited, could result in remote code...

Sorry! Image not available at this time

Cacti Command Injection Vulnerability Let Attackers Execute Malicious Code Remotely

itsecuritynews.info - 05/Dec 08:32

A critical command injection vulnerability in the open-source network monitoring tool Cacti allows authenticated attackers to execute arbitrary code...

Sorry! Image not available at this time

Cacti Command Injection Vulnerability Let Attackers Execute Malicious Code Remotely

itsecuritynews.info - 05/Dec 08:32

A critical command injection vulnerability in the open-source network monitoring tool Cacti allows authenticated attackers to execute arbitrary code...

Sorry! Image not available at this time

Attackers Actively Exploiting Critical Vulnerability in Sneeit Framework Plugin

itsecuritynews.info - 03/Dec 17:32

On June 10th, 2025, we received a submission for a Remote Code Execution vulnerability in Sneeit Framework, a WordPress plugin with an estimated 1,700...