Debug Code in ExpressVPN Windows App Caused IP Leak via RDP Port

Debug Code in ExpressVPN Windows App Caused IP Leak via RDP Port ExpressVPN has alerted users of a security issue in its Windows application that allowed certain Remote Desktop Protocol (RDP) traffic to bypass the VPN tunnel, potentially exposing users’ IP addresse … Read more Published Date: Jul 22, 2025 (6 hours, 57 minutes ago) Vulnerabilities has […]

CVE-2025-7705 – : Active Debug Code vulnerability in ABB Switch Ac

The following table lists the changes that have been made to the CVE-2025-7705 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-4285 – Improper Neutralization of Special Elements used i

The following table lists the changes that have been made to the CVE-2025-4285 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-4284 – Improper Neutralization of Input During Web Page G

The following table lists the changes that have been made to the CVE-2025-4284 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

Cisco Warns of Identity Services Engine RCE Vulnerability Exploited in the Wild

Cisco Warns of Identity Services Engine RCE Vulnerability Exploited in the Wild Cisco Systems has issued a critical security advisory warning of multiple remote code execution vulnerabilities in its Identity Services Engine (ISE) that are being actively exploited by attackers in … Read more Published Date: Jul 22, 2025 (7 hours, 15 minutes ago) Vulnerabilities has been […]

CVE-2025-7342 – Root Access Risk in Kubernetes Image Builder

CVE-2025-7342 – Root Access Risk in Kubernetes Image Builder July 22, 2025SummaryCVE-2025-7342 is a high-severity vulnerability in the Kubernetes Image Builder project—specifically affecting builds that utilize either the Nutanix or OVA (Open Virtual Appliance) … Read more Published Date: Jul 22, 2025 (7 hours, 41 minutes ago) Vulnerabilities has been mentioned in this article.

Microsoft Sharepoint ToolShell attacks linked to Chinese hackers

Microsoft Sharepoint ToolShell attacks linked to Chinese hackers Several hacking groups with ties to the Chinese government have been linked to a recent wave of widespread attacks targeting a Microsoft SharePoint zero-day vulnerability chain. They used this exploit … Read more Published Date: Jul 22, 2025 (7 hours, 47 minutes ago) Vulnerabilities has been mentioned in this […]

CVE-2025-7900 – The femanager extension for TYPO3 allows Insecure

The following table lists the changes that have been made to the CVE-2025-7900 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-7899 – The powermail extension for TYPO3 allows Insecure

The following table lists the changes that have been made to the CVE-2025-7899 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-7692 – The Orion Login with SMS plugin for WordPress is v

The Orion Login with SMS plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.5. This is due to the olws_handle_verify_phone() function not utilizing a strong enough OTP value, exposing the hash needed to generate the OTP value, and no restrictions on the number of attempts to submit the […]