CVE-2025-21106 – Dell Recover Point for Virtual Machines File System Permission Weakness

The following table lists the changes that have been made to the CVE-2025-21106 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]

CVE-2025-21105 – Dell RecoverPoint for Virtual Machines Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-21105 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]

CVE-2025-1043 – WordPress Embed Any Document SSRF Vulnerability

CVE ID : CVE-2025-1043 Published : Feb. 20, 2025, 12:15 p.m. | 24 minutes ago Description : The Embed Any Document – Embed PDF, Word, PowerPoint and Excel Files plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.5 via the ’embeddoc’ shortcode. This makes it possible for authenticated […]

CVE-2025-0868 – DocsGPT JSON Code Injection RCE

The following table lists the changes that have been made to the CVE-2025-0868 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]

CVE-2024-49781 – IBM OpenPages with Watson XXE Injection Vulnerability

The following table lists the changes that have been made to the CVE-2024-49781 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]

CVE-2024-49779 – IBM OpenPages with Watson CSRF Token Bypass

The following table lists the changes that have been made to the CVE-2024-49779 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]

CVE-2024-49344 – IBM OpenPages with Watson Chat Session Persistence Vulnerability

The following table lists the changes that have been made to the CVE-2024-49344 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]

CVE-2024-49337 – IBM OpenPages with Watson HTML Injection

The following table lists the changes that have been made to the CVE-2024-49337 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]

Ghost Ransomware Dissection

Ghost Ransomware Dissection Ghost Ransomware, also known by various aliases such as Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture, is a sophisticated ransomware threat that has targeted organizations glo … Read more Published Date: Feb 20, 2025 (1 hour, 52 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-1094 CVE-2021-34523 CVE-2021-34473 CVE-2021-31207 CVE-2018-13379 CVE-2010-2861 […]

Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware

Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware Ransomware / Vulnerability A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with … Read more Published Date: Feb 20, 2025 (1 hour, 54 minutes ago) Vulnerabilities has been mentioned in this article. […]