Fortinet Products Multiple Vulnerabilities
Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege,...
Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege,...
Vulnerability Summary: CVE-2025-24799 GLPI is a free asset and IT management software package. An unauthenticated user can perform a SQL...
Vulnerability Summary: CVE-2024-56346 IBM AIX 7.2 and 7.3 nimesis NIM master service could allow a remote attacker to execute arbitrary...
Vulnerability Summary: CVE-2024-56347 IBM AIX 7.2 and 7.3 nimsh service SSL/TLS protection mechanisms could allow a remote attacker to execute...
Vulnerability Summary: CVE-2025-27688 Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access...
Vulnerability Summary: CVE-2025-2487 A flaw was found in the 389-ds-base LDAP Server. This issue occurs when issuing a Modify DN...
Vulnerability Summary: CVE-2025-25040 A vulnerability has been identified in the port ACL functionality of AOS-CX software running on the HPE...
Vulnerability Summary: CVE-2025-25042 A vulnerability in the AOS-CX REST interface could allow an authenticated remote attacker with low privileges to...
Vulnerability Summary: CVE-2024-12563 The s2Member Pro plugin for WordPress is vulnerable to Local File Inclusion in all versions up to,...
Vulnerability Summary: CVE-2025-24801 GLPI is a free asset and IT management software package. An authenticated user can upload and force...
Vulnerability Summary: CVE-2025-27080 Vulnerabilities in the command line interface of AOS-CX could allow an authenticated remote attacker to expose sensitive...
In today’s digital world, where cyber threats are evolving rapidly, the integration of artificial intelligence (AI) into cybersecurity practices offers...
A recent supply chain attack has put the secrets of over 23,000 organizations at risk, exposing them through a compromised...
A newly launched security database seeks to empower non-profits and high-risk individuals in navigating online threats and ensuring their digital...
In 2024, UK social media and email account compromises have surged dramatically, leading to losses nearing £1 million. This alarming...
A bipartisan group of US legislators is calling for transparency in the legal conflict between Apple and the UK government...
The digital supply chains of UK companies are notably larger and more complex compared to their global counterparts, posing significant...
A large-scale malicious app campaign is bypassing Android security, leading to over 60 million downloads of harmful applications from the...
The UK's Online Safety Act has equipped Ofcom with new powers to sanction tech platforms for failing to remove illegal...
Cybersecurity researchers have confirmed a critical link between BlackLock and the infamous Eldorado ransomware group, affirming that BlackLock is essentially...
Cloudflare is pioneering post-quantum cryptography (PQC) to protect online communications from future quantum threats, enhancing its Zero Trust platform's security....
Newly leaked chat logs reveal a concerning connection between the BlackBasta ransomware gang and Russian governmental authorities. The recent revelations...
Google's acquisition of Wiz for $32 billion marks a significant leap in cloud security offerings, enhancing its capabilities to support...
A recent study by Specops uncovers prevalent passwords used in attacks on Remote Desktop Protocol (RDP), emphasizing the security risks...