Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets

Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets

Posted on October 20, 2025October 20, 2025 By CWS

Oct 20, 2025Ravie LakshmananThreat Intelligence / Knowledge Safety
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Monday added 5 safety flaws to its Identified Exploited Vulnerabilities (KEV) Catalog, formally confirming a not too long ago disclosed vulnerability impacting Oracle E-Enterprise Suite (EBS) has been weaponized in real-world assaults.
The safety defect in query is CVE-2025-61884 (CVSS rating: 7.5), which has been described as a server-side request forgery (SSRF) vulnerability within the Runtime element of Oracle Configurator that would enable attackers unauthorized entry to essential information.
“This vulnerability is remotely exploitable with out authentication,” CISA mentioned.

CVE-2025-61884 is the second flaw in Oracle EBS to be actively exploited together with CVE-2025-61882 (CVSS rating: 9.8), a essential bug that would allow unauthenticated attackers to execute arbitrary code on prone cases.
Earlier this month, Google Menace Intelligence Group (GTIG) and Mandiant revealed dozens of organizations could have been impacted following the exploitation of CVE-2025-61882.
“Presently, we aren’t in a position to attribute any particular exploitation exercise to a particular actor, nevertheless it’s possible that a minimum of a few of the exploitation exercise we noticed was carried out by actors now conducting Cl0p-branded extortion operations,” Zander Work, senior safety engineer at GTIG, advised The Hacker Information final week.

Additionally added by CISA to the KEV catalog are 4 different vulnerabilities –

CVE-2025-33073 (CVSS rating: 8.8) – An improper entry management vulnerability in Microsoft Home windows SMB Shopper that would enable for privilege escalation (Fastened by Microsoft in June 2025)
CVE-2025-2746 (CVSS rating: 9.8) – An authentication bypass utilizing an alternate path or channel vulnerability in Kentico Xperience CMS that would enable an attacker to regulate administrative objects by profiting from the Staging Sync Server password dealing with of empty SHA1 usernames in digest authentication (Fastened in Kentico in March 2025)
CVE-2025-2747 (CVSS rating: 9.8) – An authentication bypass utilizing an alternate path or channel vulnerability in Kentico Xperience CMS that would enable an attacker to regulate administrative objects by profiting from the Staging Sync Server password dealing with for the server outlined None sort (Fastened in Kentico in March 2025)
CVE-2022-48503 (CVSS rating: 8.8) – An improper validation of array index vulnerability in Apple’s JavaScriptCore element that would lead to arbitrary code execution when processing internet content material (Fastened by Apple in July 2022)

There are at present no particulars on how the aforementioned 4 points are being exploited within the wild, though particulars about CVE-2025-33073, CVE-2025-2746, and CVE-2025-2747 have been shared by researchers from Synacktiv and watchTowr Labs, respectively.
Federal Civilian Govt Department (FCEB) businesses are required to remediate recognized vulnerabilities by November 10, 2025, to safe their networks towards lively threats.

The Hacker News Tags:Among, Bugs, Catalog, CISAs, Exploited, Land, Microsoft, Oracle, Targets

Post navigation

Previous Post: South Korea Seeks to Arrest Dozens of Online Scam Suspects Repatriated From Cambodia
Next Post: 71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks

Related Posts

U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues The Hacker News
How Attackers Exploit SOC Workloads Beyond Phishing Emails How Attackers Exploit SOC Workloads Beyond Phishing Emails The Hacker News
Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack The Hacker News
How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year? How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year? The Hacker News
Beware the Hidden Risk in Your Entra Environment Beware the Hidden Risk in Your Entra Environment The Hacker News
NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark