HPE Aruba access points kwetsbaar door hardcoded wachtwoord
HPE Aruba access points kwetsbaar door hardcoded wachtwoord Aruba access points van Hewlett Packard Enterprise (HPE) zijn kwetsbaar vanwege de aanwezigheid van een hardcoded wachtwoord, zo laat de fabrikant weten. Die heeft een update uitgebracht om het proble … Read more Published Date: Jul 21, 2025 (1 day, 1 hour ago) Vulnerabilities has been mentioned in this […]
HPE Warns of Aruba Hardcoded Credentials Allowing Attackers to Bypass Device Authentication
HPE Warns of Aruba Hardcoded Credentials Allowing Attackers to Bypass Device Authentication A critical vulnerability in Hewlett Packard Enterprise (HPE) Aruba Networking Instant On Access Points could allow attackers to bypass device authentication mechanisms completely. The vulnerability, t … Read more Published Date: Jul 21, 2025 (1 day, 1 hour ago) Vulnerabilities has been mentioned in this […]
Vulnerability in FARA software
Vulnerability in FARA software Vulnerability in FARA software CVE ID CVE-2025-4049 Publication date 21 July 2025 Vendor SIGNUM-NET Product FARA Vulnerable versions All through 5.0.80.34 Vulnerability type (CWE) Use of Hard-coded Cr … Read more Published Date: Jul 21, 2025 (1 day, 1 hour ago) Vulnerabilities has been mentioned in this article. CVE-2025-4049
CrushFTP Servers Hit by Critical Zero-Day Vulnerability CVE-2025-54309
CrushFTP Servers Hit by Critical Zero-Day Vulnerability CVE-2025-54309 A new zero-day vulnerability in CrushFTP file transfer servers is being actively exploited by cybercriminals, compromising systems around the world. Tracked as CVE-2025-54309, the CrushFTP zero-day vu … Read more Published Date: Jul 21, 2025 (1 day, 1 hour ago) Vulnerabilities has been mentioned in this article. CVE-2025-54309 CVE-2025-20337 […]
CrushFTP meldt actief misbruik van kritiek beveiligingslek
CrushFTP meldt actief misbruik van kritiek beveiligingslek De makers van ftp-serversoftware CrushFTP waarschuwen voor actief misbruik van een kritieke kwetsbaarheid waardoor aanvallers op afstand toegang tot kwetsbare servers kunnen krijgen. Misbruik is sinds … Read more Published Date: Jul 21, 2025 (1 day, 2 hours ago) Vulnerabilities has been mentioned in this article. CVE-2025-54309 CVE-2025-31161
CVE-2025-7369 – The WP Shortcodes Plugin — Shortcodes Ultimate plu
The following table lists the changes that have been made to the CVE-2025-7369 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-7354 – The WP Shortcodes Plugin — Shortcodes Ultimate plu
The following table lists the changes that have been made to the CVE-2025-7354 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-4685 – The Gutentor – Gutenberg Blocks – Page Builder for
The Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the HTML data attributes of multiple widgets, in all versions up to, and including, 3.4.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and […]
CVE-2025-4570 – An insecure sensitive key storage issue was found
The following table lists the changes that have been made to the CVE-2025-4570 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-4569 – An insecure sensitive key storage issue was found
The following table lists the changes that have been made to the CVE-2025-4569 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.