CVE-2025-25793 – SeaCMS Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-25793 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 26, 2025 Action […]

CVE-2025-25791 – YZNCMS File Upload Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-25791 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 26, 2025 Action […]

GRUB2 Vulnerabilities Exposes Millions of Linux Systems to Cyber Attack

GRUB2 Vulnerabilities Exposes Millions of Linux Systems to Cyber Attack A critical set of 20 vulnerabilities in GRUB2, the ubiquitous bootloader underpinning most Linux distributions and Unix-like systems, has exposed millions of devices to potential secure boot bypass, r … Read more Published Date: Feb 26, 2025 (1 hour, 22 minutes ago) Vulnerabilities has been mentioned in […]

CISA adds Zimbra and Microsoft vulnerabilities to its KEV Catalog

CISA adds Zimbra and Microsoft vulnerabilities to its KEV Catalog The Cybersecurity and Infrastructure Security Agency (CISA) has recently added two critical vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. These vulnerabilities, affecting Micro … Read more Published Date: Feb 26, 2025 (1 hour, 53 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-0110 CVE-2024-49035 CVE-2023-34192

Lek in back-upsoftware Nakivo laat aanvaller back-ups en wachtwoorden stelen

Lek in back-upsoftware Nakivo laat aanvaller back-ups en wachtwoorden stelen Een kwetsbaarheid in de back-upsoftware van Nakivo maakt het mogelijk voor ongeauthenticeerde aanvallers om op afstand back-ups en inloggegevens te stelen waar de software gebruik van maakt. De fabrik … Read more Published Date: Feb 26, 2025 (2 hours, 9 minutes ago) Vulnerabilities has been mentioned in […]

Black Basta Chat Logs Reveal Ransomware Group’s TTPs, IoCs

Black Basta Chat Logs Reveal Ransomware Group’s TTPs, IoCs The Black Basta ransomware group has fallen off dramatically in 2025, and chat logs leaked recently show that internal squabbling may be behind the group’s slowed activity. Cyble threat intelligence r … Read more Published Date: Feb 26, 2025 (2 hours, 23 minutes ago) Vulnerabilities has been mentioned […]

CVE-2024-47051 – Mautic Remote Code Execution and Path Traversal Vulnerabilities

The following table lists the changes that have been made to the CVE-2024-47051 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 26, 2025 Action […]

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries Network Security / Threat Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday warned of renewed activity from an organized criminal group it tracks as UAC-0173 that invol … Read more Published Date: Feb 26, 2025 (3 hours, 1 minute ago) Vulnerabilities has been […]

VS meldt actief misbruik van kritieke XSS-kwetsbaarheid in Zimbra

VS meldt actief misbruik van kritieke XSS-kwetsbaarheid in Zimbra Aanvallers maken actief misbruik van een oudere kritieke XSS-kwetsbaarheid in Zimbra of hebben dit gedaan, zo meldt het Cybersecurity and Infrastructure Security Agency (CISA) van het Amerikaanse mini … Read more Published Date: Feb 26, 2025 (3 hours, 22 minutes ago) Vulnerabilities has been mentioned in this article. […]