CVE-2025-33090 – IBM Concert Software Regular Expression Denial of Service

The following table lists the changes that have been made to the CVE-2025-33090 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 18, 2025 Action […]

CVE-2025-27909 – IBM Concert Software CORS Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-27909 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 18, 2025 Action […]

CVE-2025-1759 – IBM Concert Software Heap Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2025-1759 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 18, 2025 Action […]

CVE-2024-49827 – IBM Concert Software Information Disclosure

The following table lists the changes that have been made to the CVE-2024-49827 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 18, 2025 Action […]

APT SideWinder Actor Profile – Recent Attacks, Tactics, Techniques, and Procedures

APT SideWinder Actor Profile – Recent Attacks, Tactics, Techniques, and Procedures APT SideWinder, also known as Rattlesnake, Razor Tiger, and T-APT-04, is a nation-state advanced persistent threat (APT) group active since at least 2012 and believed to originate from India. Noted fo … Read more Published Date: Aug 18, 2025 (38 minutes ago) Vulnerabilities has been […]

CVE-2025-43733 – Liferay Portal Cross-Site Scripting (XSS) Vulnerability

The following table lists the changes that have been made to the CVE-2025-43733 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 18, 2025 Action […]

Trend Micro dicht actief aangevallen kwetsbaarheid in Apex One-platform

Trend Micro dicht actief aangevallen kwetsbaarheid in Apex One-platform Trend Micro heeft een actief aangevallen kwetsbaarheid in endpoint security platform Apex One gedicht. Het securitybedrijf kwam op 5 augustus al met een waarschuwing voor het probleem, aangeduid als C … Read more Published Date: Aug 18, 2025 (54 minutes ago) Vulnerabilities has been mentioned in this […]

1000+ Exposed N-able N-central RMM Servers Unpatched for 0-Day Vulnerabilities

1000+ Exposed N-able N-central RMM Servers Unpatched for 0-Day Vulnerabilities Over 1,000 exposed and unpatched N-able N-central Remote Monitoring and Management (RMM) servers are vulnerable to two newly disclosed zero-day vulnerabilities – CVE-2025-8875 and CVE-2025-8876. As of … Read more Published Date: Aug 18, 2025 (1 hour, 23 minutes ago) Vulnerabilities has been mentioned in this article. […]

July 2025 Detection Highlights: 7 New VMRay Threat Identifiers, Config Extractors for 4 malware families, and 35+ fresh YARA rules.

July 2025 Detection Highlights: 7 New VMRay Threat Identifiers, Config Extractors for 4 malware families, and 35+ fresh YARA rules. The Labs team at VMRay actively gathers publicly available data to identify any noteworthy malware developments that demand immediate attention. We complement this effort with our internal tracking an … Read more Published Date: Aug […]

Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code

Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code A critical security vulnerability has been discovered in Rockwell Automation’s ControlLogix Ethernet communication modules, potentially allowing remote attackers to execute arbitrary code on industria … Read more Published Date: Aug 18, 2025 (1 hour, 15 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-7353