CVE Alert: CVE-2025-25566
Vulnerability Summary: CVE-2025-25566 Memory Leak vulnerability in SoftEtherVPN 5.02.5187 allows an attacker to cause a denial of service via the...
Vulnerability Summary: CVE-2025-25566 Memory Leak vulnerability in SoftEtherVPN 5.02.5187 allows an attacker to cause a denial of service via the...
Vulnerability Summary: CVE-2025-20142 A vulnerability in the IPv4 access control list (ACL) feature and quality of service (QoS) policy feature...
Vulnerability Summary: CVE-2025-20141 A vulnerability in the handling of specific packets that are punted from a line card to a...
Vulnerability Summary: CVE-2025-20138 A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to...
Vulnerability Summary: CVE-2025-20115 A vulnerability in confederation implementation for the Border Gateway Protocol (BGP) in Cisco IOS XR Software could allow...
Ransomware Group: FOG VICTIM NAME: University Diagnostic Medical Imaging, PC (udminet) NOTE: No files or stolen information are by RedPacket...
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution,...
Vulnerability Summary: CVE-2025-20177 A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker...
Vulnerability Summary: CVE-2025-20209 A vulnerability in the Internet Key Exchange version 2 (IKEv2) function of Cisco IOS XR Software could...
Vulnerability Summary: CVE-2025-20146 A vulnerability in the Layer 3 multicast feature of Cisco IOS XR Software for Cisco ASR 9000...
Vulnerability Summary: CVE-2025-20145 A vulnerability in the access control list (ACL) processing in the egress direction of Cisco IOS XR...
Vulnerability Summary: CVE-2025-25711 An issue in dtp.ae tNexus Airport View v.2.8 allows a remote attacker to escalate privileges via the...
Vulnerability Summary: CVE-2025-25774 An issue was discovered in Open5GS v2.7.2. When a UE switches between two gNBs and sends a...
Vulnerability Summary: CVE-2024-34398 An issue was discovered in BMC Remedy Mid Tier 7.6.04. The web application allows stored HTML Injection...
Vulnerability Summary: CVE-2025-2002 CWE-532: Insertion of Sensitive Information into Log Files vulnerability exists that could cause the disclosure of FTP...
Vulnerability Summary: CVE-2025-25683 AlekSIS-Core is vulnerable to Incorrect Access Control. Unauthenticated users can access all PDF files. This affects AlekSIS-Core...
Vulnerability Summary: CVE-2025-27407 graphql-ruby is a Ruby implementation of GraphQL. Starting in version 1.11.5 and prior to versions 1.11.8, 1.12.25,...
The UK cybersecurity sector has recently shown remarkable growth, with revenue increasing by 12% to surpass £13 billion, according to...
Microsoft's March Patch Tuesday brings renewed urgency for system administrators, mandating attention to over 50 vulnerabilities, including seven critical zero-days....
Chinese hackers have targeted Juniper routers by implanting backdoor malware, prompting organizations to upgrade their devices to maintain cybersecurity. According...
The rise of machine identities in cloud environments, now outnumbering human users, poses significant security risks. According to a recent...
Concerns have emerged regarding the e-voting system for the ISACA London Chapter's upcoming Extraordinary General Meeting (EGM), set for March...
iOS 18.3.2 and iPadOS 18.3.2 have been released by Apple to address a critical WebKit vulnerability that cybercriminals have been...
The Trump administration is implementing drastic changes at the Cybersecurity and Infrastructure Agency (CISA), affecting staff and funding for vital...