CVE-2025-7785 – JeeSite Open Redirect Vulnerability
The following table lists the changes that have been made to the CVE-2025-7785 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 18, 2025 Action […]
CVE-2025-6227 – Mattermost Auth Token Interception Vulnerability
The following table lists the changes that have been made to the CVE-2025-6227 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 18, 2025 Action […]
Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code
Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code A buffer overflow vulnerability in Lenovo Protection Driver could allow local attackers with elevated privileges to execute arbitrary code on affected systems. The vulnerability, designated as CVE-202 … Read more Published Date: Jul 18, 2025 (3 hours, 30 minutes ago) Vulnerabilities has been mentioned in […]
Hackers Launch 11.5 Million Attacks on CitrixBleed 2-Compromising Over 100 Organizations
Hackers Launch 11.5 Million Attacks on CitrixBleed 2-Compromising Over 100 Organizations A massive wave of exploitation targeting the critical CitrixBleed 2 vulnerability (CVE-2025-5777), with over 11.5 million attack attempts recorded since its disclosure in June. The campaign has succes … Read more Published Date: Jul 18, 2025 (1 hour, 56 minutes ago) Vulnerabilities has been mentioned in […]
Ivanti Bugs Exploited Even After Three Months of Patch Availability
Ivanti Bugs Exploited Even After Three Months of Patch Availability Japan’s cyber defenders have raised the red flag, once again, for a set of Ivanti Connect Secure vulnerabilities that continue to be exploited to present day, although a patch has been available for t … Read more Published Date: Jul 18, 2025 (2 hours, 1 minute ago) […]
Kaspersky ontdekt geavanceerde backdoor in Exchange-systemen
Kaspersky ontdekt geavanceerde backdoor in Exchange-systemen Het “GReAT” (Global Research & Analysis Team) securityteam van Kaspersky heeft een geavanceerde multifunctionele backdoor, genaamd “GhostContainer” ontdekt. Het gaat om op maat gemaakte malware, die s … Read more Published Date: Jul 18, 2025 (2 hours, 1 minute ago) Vulnerabilities has been mentioned in this article. CVE-2020-0688
Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services
Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services Jul 18, 2025Ravie LakshmananCloud Security / AI Security Cybersecurity researchers have disclosed a critical container escape vulnerability in the NVIDIA Container Toolkit that could pose a severe t … Read more Published Date: Jul 18, 2025 (2 hours, 42 minutes ago) Vulnerabilities has been mentioned […]
Cisco waarschuwt voor kritieke kwetsbaarheden Cisco ISE en Cisco ISE-PIC
Cisco waarschuwt voor kritieke kwetsbaarheden Cisco ISE en Cisco ISE-PIC Cisco waarschuwt voor meerdere critical kwetsbaarheden in Cisco Identity Services Engine (ISE) en Cisco ISE Passive Identity Connector (ISE-PIC). De kwetsbaarheden stellen kwaadwillenden in staat om a … Read more Published Date: Jul 18, 2025 (1 hour, 10 minutes ago) Vulnerabilities has been mentioned in this article. […]
CVE-2025-6233 – Mattermost File Attachment Path Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-6233 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 18, 2025 Action […]
CVE-2025-50126 – Joomla RSBlog! Stored XSS Vulnerability
The following table lists the changes that have been made to the CVE-2025-50126 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 18, 2025 Action […]