CVE-2025-26741 – AWEOS GmbH Email Notifications for Updates Missing Authorization Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-26741 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
Outlaw Linux Malware Detailed Out
Outlaw Linux Malware Detailed Out The Outlaw Linux malware is a persistent and evolving cryptojacking botnet designed to exploit Linux servers with weak SSH credentials. Operated by the Outlaw hacking group, this malware spreads auton … Read more Published Date: Apr 15, 2025 (2 hours, 43 minutes ago) Vulnerabilities has been mentioned in this article.
CVE-2025-32943 – PeerTube File Traversal Information Disclosure
The following table lists the changes that have been made to the CVE-2025-32943 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
CVE-2025-1688 – Milestone XProtect Installer Password Reset Vulnerability
The following table lists the changes that have been made to the CVE-2025-1688 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by cf45122d-9d50-442a-9b23-e05cde9943d8 Apr. 15, 2025 Action […]
Critical flaws fixed in Nagios Log Server
Critical flaws fixed in Nagios Log Server The Nagios Security Team has fixed three critical vulnerabilities affecting popular enterprise log management and analysis platform Nagios Log Server. About the flaws The vulnerabilities, discovered a … Read more Published Date: Apr 15, 2025 (1 hour, 12 minutes ago) Vulnerabilities has been mentioned in this article.
CVE-2025-2083 – WordPress Logo Carousel Gutenberg Block Stored Cross-Site Scripting
The following table lists the changes that have been made to the CVE-2025-2083 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
CVE-2025-3579 – Aidex Command Injection Vulnerability
In versions prior to Aidex 1.7, an authenticated malicious user, taking advantage of an open registry, could execute unauthorised commands within the system. This includes executing operating system (Unix) commands, interacting with internal services such as PHP or MySQL, and even invoking native functions of the framework used, such as Laravel or Symfony. This execution […]
CVE-2025-3578 – Aidex Privilege Escalation and Information Disclosure Vulnerability
A malicious, authenticated user in Aidex, versions prior to 1.7, could list credentials of other users, create or modify existing users in the application, list credentials of users in production or development environments. In addition, it would be possible to cause bugs that would result in the exfiltration of sensitive information, such as details about […]
CVE-2025-3575 – T-INNOVA Deporsite Insecure Direct Object Reference
The following table lists the changes that have been made to the CVE-2025-3575 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
CVE-2025-3574 – T-INNOVA Deporsite Insecure Direct Object Reference
The following table lists the changes that have been made to the CVE-2025-3574 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]