Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers Cybersecurity researchers have shed light on an “auto-propagating” cryptocurrency mining botnet called Outlaw (aka Dota) that’s known for targeting SSH servers with weak credentials. “Outlaw is a Linu … Read more Published Date: Apr 02, 2025 (4 hours, 6 minutes ago) Vulnerabilities has been mentioned […]

March 2025 Detection Highlights: Detecting CPU Property Queries and Another Month of YARA Rules.

March 2025 Detection Highlights: Detecting CPU Property Queries and Another Month of YARA Rules. The Labs team at VMRay actively gathers publicly available data to identify any noteworthy malware developments that demand immediate attention. We complement this effort with our internal tracking an … Read more Published Date: Apr 02, 2025 (2 hours, 25 minutes ago) Vulnerabilities […]

CVE-2025-3098 – WordPress Video Url Reflected Cross-Site Scripting

The following table lists the changes that have been made to the CVE-2025-3098 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]

CVE-2025-3099 – WordPress My Solr Server CSRF

The following table lists the changes that have been made to the CVE-2025-3099 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]

CVE-2025-3097 – WordPress Time Machine CSRF

The following table lists the changes that have been made to the CVE-2025-3097 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]

CVE-2025-3063 – WordPress Shopper Approved Reviews Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-3063 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]

CVE-2025-2513 – WordPress Smart Icons Stored Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-2513 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]

CVE-2025-2483 – WordPress Gift Certificate Creator Reflected Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-2483 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]

CVE-2025-2005 – WordPress Front End Users Arbitrary File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2025-2005 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]

CVE-2024-13637 – WordPress Demo Awesome Plugin Unauthenticated Plugin Installation

The following table lists the changes that have been made to the CVE-2024-13637 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]