CVE-2025-24557 – Plainware.com PlainInventory Cross-site Scripting

The following table lists the changes that have been made to the CVE-2025-24557 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]

CVE-2025-24556 – DualCube MooWoodle Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2025-24556 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]

CVE-2025-24545 – BannerSky.com BSK Forms Validation Cross-site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-24545 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]

CVE-2025-24544 – Alexandros Georgiou Bitcoin and Altcoin Wallets Cross-site Scripting

The following table lists the changes that have been made to the CVE-2025-24544 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]

Cyber Brief 25-02 – January 2025

Cyber Brief 25-02 – January 2025 Cyber Brief (January 2025)February 3, 2025 – Version: 1TLP:CLEARExecutive summaryWe analysed 262 open source reports for this Cyber Brief1.Policy, cooperation, and law enforcement. Lithuania inaugurat … Read more Published Date: Feb 03, 2025 (14 hours, 15 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-0282 CVE-2024-25608

768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023

768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023 Vulnerability / Network Security As many as 768 vulnerabilities with designated CVE identifiers were reported as exploited in the wild in 2024, up from 639 CVEs in 2023, registering a 20% increase yea … Read more Published Date: Feb 03, 2025 (1 hour, […]

CVE-2024-57522 – SourceCodester Packers and Movers Management System XSS

The following table lists the changes that have been made to the CVE-2024-57522 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]

CVE-2023-6080: A Case Study on Third-Party Installer Abuse

CVE-2023-6080: A Case Study on Third-Party Installer Abuse Written By: Jacob Paullus, Daniel McNamara, Jake Rawlins, Steven Karschnia Executive Summary Mandiant exploited flaws in the Microsoft Software Installer (MSI) repair action of Lakeside Software’s Sys … Read more Published Date: Feb 03, 2025 (4 hours, 54 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2023-6080

CISA Warns on Contec CM8000 having a Backdoor

CISA Warns on Contec CM8000 having a Backdoor The Contec CM8000 patient monitor has been identified as having critical vulnerabilities, specifically backdoor functionalities, which pose significant risks to patient safety and data privacy. Here i … Read more Published Date: Feb 03, 2025 (58 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-0683 CVE-2025-0626 CVE-2025-24480 […]

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 February]

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 February] This week, our news radar shows that every new tech idea comes with its own challenges. A hot AI tool is under close watch, law enforcement is shutting down online spots that help cybercriminals, and … Read more Published Date: Feb 03, 2025 […]