CVE Alert: CVE-2025-24677
Vulnerability Summary: CVE-2025-24677 Improper Control of Generation of Code ('Code Injection') vulnerability in WPSpins Post/Page Copying Tool allows Remote Code...
Vulnerability Summary: CVE-2025-24677 Improper Control of Generation of Code ('Code Injection') vulnerability in WPSpins Post/Page Copying Tool allows Remote Code...
Vulnerability Summary: CVE-2025-24599 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tribulant Newsletters allows Reflected XSS....
Vulnerability Summary: CVE-2025-24598 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in brandtoss WP Mailster allows Reflected...
Vulnerability Summary: CVE-2025-24648 Incorrect Privilege Assignment vulnerability in wpase.com Admin and Site Enhancements (ASE) allows Privilege Escalation. This issue affects...
Company Name: curl Company HackerOne URL: https://hackerone.com/curl Submitted By:z2_Link to Submitters Profile:https://hackerone.com/z2_ Report Title:CVE-2025-0725: gzip integer overflowReport Link:https://hackerone.com/reports/2956023Date Submitted:05 February...
Company Name: IBM Company HackerOne URL: https://hackerone.com/ibm Submitted By:sweetheart1337_Link to Submitters Profile:https://hackerone.com/sweetheart1337_ Report Title:Weak credentials found in Jenkins endpointReport Link:https://hackerone.com/reports/2954547Date...
Ransomware Group: RANSOMHUB VICTIM NAME: annegradyorg NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: QILIN VICTIM NAME: rablightingcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: APT73 VICTIM NAME: boostheatcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Vulnerability Summary: CVE-2025-23059 A vulnerability in the web-based management interface of HPE Aruba Networking ClearPass Policy Manager exposes directories containing...
Vulnerability Summary: CVE-2024-45659 IBM Security Verify Access Appliance and Container 10.0.0 through 10.0.8 could allow a remote attacker to obtain...
Vulnerability Summary: CVE-2025-0364 BigAntSoft BigAnt Server, up to and including version 5.6.06, is vulnerable to unauthenticated remote code execution via...
Vulnerability Summary: CVE-2025-23060 A vulnerability in HPE Aruba Networking ClearPass Policy Manager may, under certain circumstances, expose sensitive unencrypted information....
Vulnerability Summary: CVE-2025-23058 A vulnerability in the ClearPass Policy Manager web-based management interface allows a low-privileged (read-only) authenticated remote attacker...
Vulnerability Summary: CVE-2025-0630 Multiple Western Telematic (WTI) products contain a web interface that is vulnerable to a local file inclusion...
Vulnerability Summary: CVE-2025-24968 reNgine is an automated reconnaissance framework for web applications. An unrestricted project deletion vulnerability allows attackers with...
Vulnerability Summary: CVE-2025-24964 Vitest is a testing framework powered by Vite. Affected versions are subject to arbitrary remote Code Execution...
Vulnerability Summary: CVE-2025-25039 A vulnerability in the web-based management interface of HPE Aruba Networking ClearPass Policy Manager (CPPM) allows remote...
Vulnerability Summary: CVE-2025-0509 A security issue was found in Sparkle before version 2.64. An attacker can replace an existing signed...
Ransomware Group: PLAY VICTIM NAME: Mid-State Machine & Fabricating Corp NOTE: No files or stolen information are by RedPacket Security....
Ransomware Group: FUNKSEC VICTIM NAME: caracommy NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: FUNKSEC VICTIM NAME: rattelacademycom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...