Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools
Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools The notorious Russian cyberespionage group Fancy Bear, also known as APT28, has intensified its operations against governments and military entities worldwide using an arsenal of sophisticated new too … Read more Published Date: Jul 18, 2025 (3 hours, 35 minutes ago) Vulnerabilities has been mentioned in […]
CVE-2025-7786 – Gnuboard Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-7786 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 18, 2025 Action […]
CVE-2025-7784 – Keycloak Fine-Grained Admin Permissions Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-7784 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 18, 2025 Action […]
CVE-2025-46002 – Apache Filemanager Directory Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-46002 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 18, 2025 Action […]
CVE-2025-46001 – Apache Filemanager PHP File Upload RCE
The following table lists the changes that have been made to the CVE-2025-46001 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 18, 2025 Action […]
CVE-2024-13175 – Vidco Software VOC TESTER Authorization Bypass
The following table lists the changes that have been made to the CVE-2024-13175 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 18, 2025 Action […]
Signal-kloon TeleMessage SGNL gebruikte kwetsbare Spring Boot Actuator
Signal-kloon TeleMessage SGNL gebruikte kwetsbare Spring Boot Actuator Bepaalde versies van TeleMessage SGNL, een versleutelde berichtenapp die specifiek is ontworpen voor overheidsorganisaties en grote bedrijven, zijn kwetsbaar voor cyberaanvallen. Een oude versie van S … Read more Published Date: Jul 18, 2025 (1 hour, 32 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-48927 CVE-2025-4892
Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon
Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon A sophisticated malware campaign targeting Ivanti Connect Secure VPN devices has been actively exploiting critical vulnerabilities CVE-2025-0282 and CVE-2025-22457 since December 2024. The ongoing att … Read more Published Date: Jul 18, 2025 (2 hours, 22 minutes ago) Vulnerabilities has been mentioned in this article. […]
Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution
Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution Three critical vulnerabilities in the Sophos Intercept X for Windows product family could allow local attackers to achieve arbitrary code execution with system-level privileges. Identified as CVE-2024 … Read more Published Date: Jul 18, 2025 (2 hours, 22 minutes ago) Vulnerabilities has been mentioned in this article. […]
Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands
Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands A critical security vulnerability affecting multiple Ubiquiti UniFi Access devices could allow attackers to execute malicious commands remotely. The vulnerability, tracked as CVE-2025-27212, stems fro … Read more Published Date: Jul 18, 2025 (3 hours, 2 minutes ago) Vulnerabilities has been mentioned in this article.