CVE-2025-4302 – WordPress Stop User Enumeration REST API Bypass
CVE ID : CVE-2025-4302 Published : July 17, 2025, 8:15 a.m. | 14 minutes ago Description : The Stop User Enumeration WordPress plugin before version 1.7.3 blocks REST API /wp-json/wp/v2/users/ requests for non-authorized users. However, this can be bypassed by URL-encoding the API path. Severity: 0.0 | NA Visit the link for more details, such as […]
GhostContainer backdoor: malware compromising Exchange servers of high-value organizations in Asia
GhostContainer backdoor: malware compromising Exchange servers of high-value organizations in Asia In a recent incident response (IR) case, we discovered highly customized malware targeting Exchange infrastructure within government environments. Analysis of detection logs and clues within the sampl … Read more Published Date: Jul 17, 2025 (1 hour, 52 minutes ago) Vulnerabilities has been mentioned in this […]
Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors
Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors The Taiwanese semiconductor industry has become the target of spear-phishing campaigns undertaken by three Chinese state-sponsored threat actors. “Targets of these campaigns ranged from organizations … Read more Published Date: Jul 17, 2025 (4 hours, 5 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-3648 […]
Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User
Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User A trio of newly disclosed CVE-2025-6230, CVE-2025-6231 and CVE-2025-6232 underscores how a single trusted OEM utility can become a springboard for full machine compromise. Lenovo Vantage, shipped by d … Read more Published Date: Jul 17, 2025 (2 hours, 40 minutes ago) Vulnerabilities has been mentioned […]
CVE‑2025‑27210 & CVE‑2025‑27209: Two high‑severity vulnerabilities in Node.js
CVE‑2025‑27210 & CVE‑2025‑27209: Two high‑severity vulnerabilities in Node.js What is this vulnerability?Two high‑severity flaws: CVE‑2025‑27210 and CVE‑2025‑27209 were found in Node.js. The first is a path traversal bypass exploiting Windows device names (CON, PRN, AUX). The s … Read more Published Date: Jul 17, 2025 (2 hours, 14 minutes ago) Vulnerabilities has been mentioned in this article.
TryHackMe Room Walkthrough: Billing
TryHackMe Room Walkthrough: Billing 🧠 TryHackMe Room Walkthrough: BillingA detailed walkthrough of TryHackMe’s Billing room exploiting CVE-2023–30258 and escalating via fail2ban misconfig4 min read11 hours agoRoom Link: https://tryhackm … Read more Published Date: Jul 17, 2025 (2 hours, 15 minutes ago) Vulnerabilities has been mentioned in this article.
Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code
Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code Jul 17, 2025Ravie LakshmananVulnerability / Network Security Cisco has disclosed a new maximum-severity security vulnerability impacting Identity Services Engine (ISE) and Cisco ISE Passive Identity … Read more Published Date: Jul 17, 2025 (2 hours, 15 minutes ago) Vulnerabilities has been mentioned in this […]
CVE-2025-7735 – UNIMAX Hospital Information System SQL Injection
The following table lists the changes that have been made to the CVE-2025-7735 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-6558 – Chrome Zero-Day Sandbox Escape via GPU Rendering Flaw
CVE-2025-6558 – Chrome Zero-Day Sandbox Escape via GPU Rendering Flaw Skip to content July 17, 2025Threat OverviewCVE-2025-6558 is a high-risk zero-day vulnerability (CVSS score: 8.8) impacting Google Chrome’s graphics rendering pipeline, specifically within the ANGLE ( … Read more Published Date: Jul 17, 2025 (2 hours, 30 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-6558 […]
CVE-2025-7712 – The Madara WordPress Core Plugin Unvalidated File Deletion Vulnerability
The following table lists the changes that have been made to the CVE-2025-7712 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]