CVE Alert: CVE-2025-1651
Vulnerability Summary: CVE-2025-1651 A maliciously crafted MODEL file, when parsed through Autodesk AutoCAD, can force a Heap-Based Overflow vulnerability. A...
Vulnerability Summary: CVE-2025-1651 A maliciously crafted MODEL file, when parsed through Autodesk AutoCAD, can force a Heap-Based Overflow vulnerability. A...
Vulnerability Summary: CVE-2025-29773 Froxlor is open-source server administration software. A vulnerability in versions prior to 2.2.6 allows users (such as...
Vulnerability Summary: CVE-2025-2264 A Path Traversal Information Disclosure vulnerability exists in "Sante PACS Server.exe". An unauthenticated remote attacker can exploit...
Vulnerability Summary: CVE-2025-2265 The password of a web user in "Sante PACS Server.exe" is zero-padded to 0x2000 bytes, SHA1-hashed, base64-encoded,...
Vulnerability Summary: CVE-2025-29768 Vim, a text editor, is vulnerable to potential data loss with zip.vim and special crafted zip files...
Vulnerability Summary: CVE-2025-2284 A denial-of-service vulnerability exists in the "GetWebLoginCredentials" function in "Sante PACS Server.exe". Affected Endpoints: No affected endpoints...
Vulnerability Summary: CVE-2025-2263 During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt...
Vulnerability Summary: CVE-2025-24053 Improper authentication in Microsoft Dataverse allows an authorized attacker to elevate privileges over a network. Affected Endpoints:...
Vulnerability Summary: CVE-2024-30143 HCL AppScan Traffic Recorder fails to adequately neutralize special characters within the filename, potentially allowing it to...
Vulnerability Summary: CVE-2025-27496 Snowflake, a platform for using artificial intelligence in the context of cloud computing, has a vulnerability in...
Vulnerability Summary: CVE-2025-2230 A flaw exists in the Windows login flow where an AuthContext token can be exploited for replay...
Vulnerability Summary: CVE-2025-2229 A token is created using the username, current date/time, and a fixed AES-128 encryption key, which is...
In the ever-evolving landscape of cybersecurity, threat hunting has emerged as a pivotal practice for organizations aiming to protect their...
The UK ICO has issued an important warning regarding the handling of children's data, urging digital firms to comply with...
The Volt Typhoon cyber intrusion highlights critical vulnerabilities within the US electric grid, raising urgent cybersecurity concerns. A prolonged cyber...
Tech complexity poses significant challenges for UK cybersecurity leaders, hindering their ability to secure systems effectively. The ever-increasing complexity of...
In Q4 2024, cybersecurity startups experienced a substantial influx of venture capital investment, marking a remarkable 35% year-on-year growth. Venture...
The ClickFix phishing scam is a sophisticated campaign targeting the hospitality industry by impersonating Booking.com. A sophisticated ClickFix phishing scam...
The Medusa ransomware operation poses a significant threat to critical infrastructure, warning organizations to take proactive measures. The Cybersecurity and...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...