CVE-2025-3546 – H3C Magic NX15/Business Ethernet Switch HTTP Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-3546 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 14, 2025 Action […]
CVE-2025-3545 – H3C Magic NX Series HTTP POST Request Handler Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-3545 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 14, 2025 Action […]
CVE-2025-32428: Jupyter Remote Desktop Proxy Exposes TigerVNC to Network Access
CVE-2025-32428: Jupyter Remote Desktop Proxy Exposes TigerVNC to Network Access Researchers have uncovered a critical security flaw in Jupyter Remote Desktop Proxy, a widely used Jupyter extension that allows users to run graphical desktop environments like XFCE within a Jupyter … Read more Published Date: Apr 14, 2025 (1 hour, 56 minutes ago) Vulnerabilities has been mentioned […]
CVE-2025-3544 – H3C Magic NX15/30 Pro/400/BE18000 HTTP POST Request Handler Command Injection
The following table lists the changes that have been made to the CVE-2025-3544 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 14, 2025 Action […]
CVE-2025-3543 – H3C Magic NX Series HTTP POST Request Handler Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-3543 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 14, 2025 Action […]
CVE-2025-27840: How a Tiny ESP32 Chip Could Crack Open Bitcoin Wallets Worldwide
CVE-2025-27840: How a Tiny ESP32 Chip Could Crack Open Bitcoin Wallets Worldwide Image: Crypto Deep Tech In a jaw-dropping revelation, researchers at Crypto Deep Tech have exposed a severe cryptographic vulnerability in the ubiquitous ESP32 microcontroller, cataloged as CVE-2025-2 … Read more Published Date: Apr 14, 2025 (52 minutes ago) Vulnerabilities has been mentioned in this […]
Nationwide Smishing Scam Targets Toll Road Users, Stealing Payment Data
Nationwide Smishing Scam Targets Toll Road Users, Stealing Payment Data Sample phishing SMS messages | Image: Cisco Talos A widespread and persistent SMS phishing (smishing) campaign, uncovered by the Cisco Talos team, has been targeting toll road users across at least ei … Read more Published Date: Apr 14, 2025 (59 minutes ago) Vulnerabilities has been […]
CVE-2025-3542 – H3C Magic NX15, Magic NX400 and Magic R3010 Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-3542 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 14, 2025 Action […]
Urgent: Yii 2 Vulnerability CVE-2024-58136 Under Active Exploit
Urgent: Yii 2 Vulnerability CVE-2024-58136 Under Active Exploit A critical security vulnerability, tracked as CVE-2024-58136 (CVSS 9.1), has been uncovered in the popular PHP web application framework Yii 2, affecting versions prior to 2.0.52. With over 25 million … Read more Published Date: Apr 14, 2025 (1 hour, 29 minutes ago) Vulnerabilities has been mentioned in this […]
Houthi Influence Campaign: Deceptive Tactics on Facebook Target Israel and Gulf States
Houthi Influence Campaign: Deceptive Tactics on Facebook Target Israel and Gulf States In a recent cybersecurity analysis, ClearSky’s team uncovered a persistent influence campaign originating from Yemen/Houthi, targeting Israel and Gulf states. The campaign, initially exposed in 2019, … Read more Published Date: Apr 14, 2025 (1 hour, 36 minutes ago) Vulnerabilities has been mentioned in this […]