OpenH264 Codec Vulnerability (CVE-2025-27091): Remote Code Execution Possible
OpenH264 Codec Vulnerability (CVE-2025-27091): Remote Code Execution Possible Cisco has released a security advisory concerning a high-severity vulnerability in the OpenH264 codec library. Tracked as CVE-2025-27091 and assigned a CVSSv4 score of 8.6, this vulnerability could al … Read more Published Date: Feb 26, 2025 (3 hours, 57 minutes ago) Vulnerabilities has been mentioned in this article. […]
GRUB2 Bootloader Vulnerabilities Expose Millions of Systems to Attacks
GRUB2 Bootloader Vulnerabilities Expose Millions of Systems to Attacks A series of critical vulnerabilities have been discovered in GRUB2, the popular boot loader used by many Linux distributions. These flaws could allow attackers to bypass security measures, potentially … Read more Published Date: Feb 26, 2025 (4 hours, 7 minutes ago) Vulnerabilities has been mentioned in this […]
PolarEdge Botnet: 2,000+ IoT Devices Infected
PolarEdge Botnet: 2,000+ IoT Devices Infected Image: SekoiaThe PolarEdge botnet, a sophisticated IoT-based malware campaign, has been discovered by Sekoia’s Threat Detection & Research (TDR) team, targeting vulnerable Cisco Small Business Routers … Read more Published Date: Feb 26, 2025 (2 hours, 43 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2023-20118
CVE-2025-1091 – Fortinet FortiOS Authorization Bypass
The following table lists the changes that have been made to the CVE-2025-1091 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 26, 2025 Action […]
CVE-2025-0760 – Zimbra Email Server Unencrypted SMTP Credentials Disclosure
The following table lists the changes that have been made to the CVE-2025-0760 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 26, 2025 Action […]