CVE Alert: CVE-2025-29223
Vulnerability Summary: CVE-2025-29223 Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability via the pt parameter in the...
Vulnerability Summary: CVE-2025-29223 Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability via the pt parameter in the...
Vulnerability Summary: CVE-2025-2602 A vulnerability has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as...
Vulnerability Summary: CVE-2025-2607 A vulnerability was found in phplaozhang LzCMS-LaoZhangBoKeXiTong up to 1.1.4. It has been rated as critical. Affected...
Vulnerability Summary: CVE-2025-2603 A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical....
Vulnerability Summary: CVE-2025-25036 Improper Restriction of XML External Entity Reference vulnerability in Jalios JPlatform allows XML Injection.This issue affects all...
Vulnerability Summary: CVE-2025-2606 A vulnerability was found in SourceCodester Best Church Management Software 1.0. It has been declared as critical....
Vulnerability Summary: CVE-2025-2604 A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. It has been classified...
Vulnerability Summary: CVE-2025-30204 golang-jwt is a Go implementation of JSON Web Tokens. Prior to 5.2.2 and 4.5.2, the function parse.ParseUnverified...
Vulnerability Summary: CVE-2025-2610 Improper neutralization of input during web page generation vulnerability in MagnusSolution MagnusBilling (Alarm Module modules) allows authenticated...
Vulnerability Summary: CVE-2025-2608 A vulnerability classified as critical has been found in PHPGurukul Banquet Booking System 1.2. This affects an...
Vulnerability Summary: CVE-2025-2609 Improper neutralization of input during web page generation vulnerability in MagnusSolution MagnusBilling login logging allows unauthenticated users...
Vulnerability Summary: CVE-2025-26500 : Uncontrolled Resource Consumption vulnerability in Wind River Systems VxWorks 7 on VxWorks allows Excessive Allocation. Specifically...
HP's latest Threat Insights Report highlights a troubling rise in fake CAPTCHA attacks aimed at deploying the Lumma Stealer remote...
The Albabat ransomware has undergone significant evolution, expanding its reach to target Linux and macOS systems alongside Microsoft Windows. New...
Cybercriminals are taking advantage of vulnerabilities in CheckPoint's antivirus driver to execute malicious campaigns that evade Windows security protocols. A...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on...
CISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software CISA and the Federal Bureau...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Twenty Industrial Control Systems Advisories CISA released twenty Industrial Control Systems (ICS) advisories on February 13, 2025. These...
CISA and Partners Release Advisory on Ghost (Cring) Ransomware Today, CISA—in partnership with the Federal Bureau of Investigation (FBI) and...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on February 18, 2025. These...
CISA Releases Seven Industrial Control Systems Advisories CISA released seven Industrial Control Systems (ICS) advisories on February 20, 2025. These...