Cisco IMC Virtual Keyboard Video Monitor Let Attacker Direct User to Malicious Website

Cisco IMC Virtual Keyboard Video Monitor Let Attacker Direct User to Malicious Website Cisco disclosed a high-severity open redirect vulnerability in the Virtual Keyboard Video Monitor (vKVM) component of its Integrated Management Controller (IMC). Tracked as CVE-2025-20317 with a CVSS … Read more Published Date: Aug 28, 2025 (2 hours, 25 minutes ago) Vulnerabilities has been mentioned […]

Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide

Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide The China-linked advanced persistent threat (APT) actor known as Salt Typhoon has continued its attacks targeting networks across the world, including organizations in the telecommunications, governme … Read more Published Date: Aug 28, 2025 (2 hours, 34 minutes ago) Vulnerabilities has been mentioned in […]

ShadowSilk Leveraging Penetration-Testing Tools, Public Exploits to Attack Organizations

ShadowSilk Leveraging Penetration-Testing Tools, Public Exploits to Attack Organizations ShadowSilk first surfaced in late 2023 as a sophisticated threat cluster targeting government entities across Central Asia and the broader APAC region. Exploiting known public vulnerabilities and wide … Read more Published Date: Aug 28, 2025 (2 hours, 58 minutes ago) Vulnerabilities has been mentioned in this article. […]

UK and US Blame Three Chinese Tech Firms for Global Cyberattacks

UK and US Blame Three Chinese Tech Firms for Global Cyberattacks A coalition of international cybersecurity agencies led by the UK’s National Cyber Security Centre (NCSC) has publicly linked three China-based technology companies to a long-running global cyberattac … Read more Published Date: Aug 28, 2025 (11 hours, 36 minutes ago) Vulnerabilities has been mentioned in this […]

CVE-2025-58127 – Dell Powerscale Certificate Validation Weakness

The following table lists the changes that have been made to the CVE-2025-58127 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 28, 2025 Action […]

CVE-2025-58125 – Freebox Checkmk Exchange Plugin SSL Certificate Validation Bypass

The following table lists the changes that have been made to the CVE-2025-58125 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 28, 2025 Action […]

CVE-2025-54742 – Magepeopleteam WpEvently Untrusted Data Deserialization Object Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-54742 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 28, 2025 Action […]

CVE-2025-54734 – BPlugins B Slider Missing Authorization Vulnerability

The following table lists the changes that have been made to the CVE-2025-54734 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 28, 2025 Action […]

CVE-2025-58124 – Checkmk Exchange Certificate Validation Bypass

The following table lists the changes that have been made to the CVE-2025-58124 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 28, 2025 Action […]