{"uuid": "5e72d0f4-67f2-4c4f-ad0f-8fef55b9f499", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24799", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/432", "content": "Top Security News for Today\n\nImpossible XXE in PHP  \nhttps://www.reddit.com/r/netsec/comments/1j9f0i7/impossible_xxe_in_php/\n\nAnalysis of CVE-2025-24813 Apache Tomcat Path Equivalence RCE  \nhttps://www.reddit.com/r/netsec/comments/1j9f0ur/analysis_of_cve202524813_apache_tomcat_path/\n\nCybersecurity Can\u2019t Wait: Modern Enterprises Must Adapt  \nhttps://www.tripwire.com/state-of-security/cybersecurity-cant-wait-modern-enterprises-must-adapt\n\nPre-authentication SQL injection to RCE in GLPI (CVE-2025-24799/CVE-2025-24801)  \nhttps://www.reddit.com/r/netsec/comments/1j9hcdw/preauthentication_sql_injection_to_rce_in_glpi/\n\nChina, Russia, Iran, and North Korea Intelligence Sharing  \nhttps://www.schneier.com/blog/archives/2025/03/china-russia-iran-and-north-korea-intelligence-sharing.html\n\nBehind the Scenes of Burp AI: How we built it, and what's next  \nhttps://portswigger.net/blog/behind-the-scenes-of-burp-ai-how-we-built-it-and-whats-next\n\nNew Lumma Stealer campaign abuses Reddit threads to drop malware via fake WeTransfer links  \nhttps://www.reddit.com/r/netsec/comments/1j9xq07/new_lumma_stealer_campaign_abuses_reddit_threads/\n\nRuthless Mantis - Modus Operandi  \nhttps://www.reddit.com/r/netsec/comments/1j9v0dh/ruthless_mantis_modus_operandi/\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-03-13T09:30:43.000000Z"}