CISA Warns of Oracle Agile Vulnerability Exploited in the Wild

CISA Warns of Oracle Agile Vulnerability Exploited in the Wild The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory regarding CVE-2024-20953, a high-severity deserialization vulnerability in Oracle’s Agile Product Lifecycle Ma … Read more Published Date: Feb 25, 2025 (2 hours, 12 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-21287 CVE-2024-20953

PoC Released: CVE-2024-13159 (CVSS 9.8) in Ivanti EPM Poses Severe Security Threat

PoC Released: CVE-2024-13159 (CVSS 9.8) in Ivanti EPM Poses Severe Security Threat Image: Horizon3.aiSecurity researcher Zach Hanley (@hacks_zach) of Horizon3.ai published the technical details and a proof-of-concept (PoC) exploit code for CVE-2024-13159, a critical vulnerability in … Read more Published Date: Feb 25, 2025 (2 hours, 55 minutes ago) Vulnerabilities has been mentioned in this article.

CVE-2025-1128: Everest Forms Plugin Exposes 100,000+ WordPress Sites to Complete Takeover

CVE-2025-1128: Everest Forms Plugin Exposes 100,000+ WordPress Sites to Complete Takeover A severe security vulnerability, tracked as CVE-2025-1128, has been uncovered in the popular WordPress plugin, Everest Forms, placing over 100,000 websites at immediate risk of complete compromise. Th … Read more Published Date: Feb 25, 2025 (2 hours, 58 minutes ago) Vulnerabilities has been mentioned in […]

CVE-2025-27145 – “copyparty DOM-Based Cross-Site Scripting Vulnerability”

copyparty, a portable file server, has a DOM-based cross-site scripting vulnerability in versions prior to 1.16.15. The vulnerability is considered low-risk. By handing someone a maliciously-named file, and then tricking them into dragging the file into copyparty’s Web-UI, an attacker could execute arbitrary javascript with the same privileges as that user. For example, this could […]

CVE-2025-1644 – Benner ModernaNet Cross-Site Request Forgery Vulnerability

The following table lists the changes that have been made to the CVE-2025-1644 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

Critical Mattermost Flaws (CVE-2025-20051, CVE-2025-24490, CVE-2025-25279) Expose Systems to File Read and SQL Injection Attacks

Critical Mattermost Flaws (CVE-2025-20051, CVE-2025-24490, CVE-2025-25279) Expose Systems to File Read and SQL Injection Attacks Mattermost, an open-source platform for team communication and collaboration, has addressed three critical security vulnerabilities affecting its Boards plugin. The vulnerabilities, identified as CVE- … Read more Published Date: Feb 25, 2025 (3 hours, 7 minutes ago) Vulnerabilities has been mentioned in […]

OpenAI Purges ChatGPT Accounts: China and North Korea Weaponizing AI for Propaganda

OpenAI Purges ChatGPT Accounts: China and North Korea Weaponizing AI for Propaganda OpenAI has confirmed that it has begun blocking accounts linked to Chinese and North Korean users who have been leveraging ChatGPT to monitor and influence social media discourse.While OpenAI has not … Read more Published Date: Feb 25, 2025 (3 hours, 17 minutes ago) Vulnerabilities […]

CISA Flags Actively Exploited Security Vulnerabilities in Adobe ColdFusion and Oracle Agile PLM

CISA Flags Actively Exploited Security Vulnerabilities in Adobe ColdFusion and Oracle Agile PLM Cybersecurity and Infrastructure Security Agency (CISA) has added two critical security vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, signaling active exploitation in the wild. … Read more Published Date: Feb 25, 2025 (3 hours, 23 minutes ago) Vulnerabilities has been mentioned in this […]

From Confluence Vulnerability (CVE-2023-22527) to LockBit Encryption: A Rapid Attack Chain

From Confluence Vulnerability (CVE-2023-22527) to LockBit Encryption: A Rapid Attack Chain LockBit ransom note | Image: The DFIR ReportSecurity researchers at The DFIR Report have uncovered a highly coordinated attack that leveraged a critical remote code execution (RCE) vulnerability in Co … Read more Published Date: Feb 25, 2025 (3 hours, 37 minutes ago) Vulnerabilities has been […]