Tag: cve
-
CentOS Web Panel Vulnerability Allows Remote Code Execution PoC Released
A critical security vulnerability has been discovered in CentOS Web Panel (CWP), a widely used web hosting management solution. The flaw, tracked as CVE-2025-48703, allows unauthenticated attackers to execute arbitrary commands on affected systems, potentially leading to full server compromise. A proof-of-concept (PoC) exploit demonstrating remote code execution (RCE) has been publicly released, raising concerns…
-
Critical Kibana Flaws Enable Heap Corruption and Remote Code Execution
A critical security flaw has been uncovered in Kibana, the popular data visualization platform for the Elastic Stack, exposing organizations to severe risks of heap corruption and potential remote code execution. The vulnerability, tracked as CVE-2025-2135, carries a CVSS v3.1 score of 9.9, marking it as a critical threat that requires immediate attention from both…
-
TeamViewer for Windows Vulnerability Lets Hackers Delete Files with SYSTEM Rights
A critical security vulnerability has been discovered in TeamViewer Remote Management for Windows, exposing systems to potential privilege escalation attacks. The flaw, tracked as CVE-2025-36537, allows a local unprivileged attacker to delete arbitrary files with SYSTEM-level privileges, posing a significant risk to organizations relying on TeamViewer’s Remote Management features. Vulnerability Overview The vulnerability, assigned a…
-
NVIDIA Megatron LM Flaw Allows Attackers to Inject Malicious Code
NVIDIA has issued an urgent security update for its open-source Megatron-LM framework, following the discovery of two critical vulnerabilities that could allow attackers to inject and execute malicious code on affected systems. The flaws, tracked as CVE-2025-23264 and CVE-2025-23265, impact all platforms running Megatron-LM versions prior to 0.12.0 and have prompted a swift response from…
-
Threat Actors Exploit ConnectWise Configuration to Create Signed Malware
Threat actors have increasingly exploited vulnerabilities and configurations in ConnectWise software to distribute signed malware, masquerading as legitimate applications. Initially observed in February 2024 with ransomware attacks linked to vulnerabilities CVE-2024-1708 and CVE-2024-1709, the abuse escalated by March 2025 under the moniker “EvilConwi”. This new wave of attacks leverages ConnectWise’s ScreenConnect tool, manipulating its certificate…
-
Zimbra Classic Web Client Vulnerability Allows Arbitrary JavaScript Execution
A critical security flaw has been discovered and patched in the Zimbra Collaboration Suite (ZCS) Classic Web Client, exposing millions of business users to the risk of arbitrary JavaScript execution through stored cross-site scripting (XSS). Tracked as CVE-2025-27915, this vulnerability affects ZCS versions 9.0, 10.0, and 10.1 prior to the latest patch releases, and is…
-
OPPO Clone Phone Vulnerability Leaks Sensitive Data via Weak WiFi Hotspot
A newly disclosed security vulnerability in OPPO’s widely used Clone Phone app has raised significant concerns over user privacy, as it exposes sensitive data through a weakly secured WiFi hotspot. The flaw, cataloged as CVE-2025-27387, has been rated as high severity and was published in the National Vulnerability Database and GitHub Advisory Database within the…
-
WinRAR Vulnerability Exploited with Malicious Archives to Execute Code
Tags: cve, cvss, cyber, exploit, flaw, malicious, remote-code-execution, risk, vulnerability, windowsA newly disclosed vulnerability in RARLAB’s WinRAR, the widely used file compression utility for Windows, has put millions of users at risk of remote code execution (RCE) attacks. Tracked as CVE-2025-6218 and assigned a CVSS score of 7.8 (High), this flaw allows attackers to execute arbitrary code simply by convincing a victim to open a…
-
Zyxel Devices Hit by Active Exploits Targeting CVE-2023-28771 Vulnerability
Zyxel users beware: A critical remote code execution flaw (CVE-2023-28771) in Zyxel devices is under active exploitation by a Mirai-like botnet. GreyNoise observed a surge on June 16, targeting devices globally. First seen on hackread.com Jump to article: hackread.com/zyxel-devices-active-exploits-cve-2023-28771-vulnerability/
-
(g+) Zero-Day-Exploits: Wie Hacker IT-Systeme knacken
Hacker lieben sie wie Kinder Überraschungseier: Zero-Days wie CVE-2025-33053. Wie funktionieren solche Angriffe und wie kann man sich schützen? First seen on golem.de Jump to article: www.golem.de/news/zero-day-exploits-wie-hacker-it-systeme-knacken-2506-197252.html
-
CVE-2025-49763 Remote DoS via Memory Exhaustion in Apache Traffic Server via ESI Plugin
Remote attackers can trigger an avalanche of internal ESI requests, exhausting memory and causing denial-of-service in Apache Traffic Server. Executive Summary Imperva’s Offensive Security Team discovered CVE-2025-49763, a high-severity vulnerability (CVSS v3.1 estimated score: 7.5) in Apache Traffic Server’s ESI plugin that enables unauthenticated attackers to exhaust memory and potentially crash proxy nodes. Given ATS’s……
-
CVE-2025-49763: Apache Traffic Server Vulnerability Enables Memory Exhaustion Attacks
A security flaw in Apache Traffic Server (ATS) is targeting cloud service providers worldwide. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/apache-traffic-server-cve-2025-49763/
-
Versa Director Flaws Let Attackers Execute Arbitrary Commands
A newly disclosed set of vulnerabilities in Versa Networks’ SD-WAN orchestration platform, Versa Director, with the flaws enabling authenticated attackers to upload malicious files and execute arbitrary commands on affected systems. The vulnerabilities, tracked as CVE-2025-23171 and CVE-2025-23172, stem from insecure file upload and webhook functionalities, both carrying a CVSS score of 7.2, indicating high…
-
Dover Fueling Solutions Flaw Lets Attackers Control Fueling Operations
A newly disclosed critical vulnerability in Dover Fueling Solutions’ ProGauge MagLink LX consoles has sent shockwaves through the global fuel infrastructure sector. The flaw, tracked as CVE-2025-5310, allows remote attackers to seize control of fueling operations, manipulate tank monitoring, and even deploy malware, posing a severe risk to transportation systems worldwide. Critical Flaw Exposes Global…
-
Over 100,000 WordPress Sites Exposed to Privilege Escalation via MCP AI Engine
The Wordfence Threat Intelligence team identified a severe security flaw in the AI Engine plugin, a widely used tool installed on over 100,000 WordPress websites. This vulnerability, classified as an Insufficient Authorization to Privilege Escalation via Model Context Protocol (MCP), has a CVSS score of 8.8 (High) and has been assigned the identifier CVE-2025-5071. Affecting…
-
CISA Alerts to Active Exploits of Linux Kernel Improper Ownership Management Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert regarding active exploitation of a critical Linux kernel vulnerability, tracked as CVE-2023-0386, which has now been added to the Known Exploited Vulnerabilities (KEV) Catalog. This flaw, rooted in the OverlayFS subsystem of the Linux kernel, allows local users to escalate privileges and potentially gain…
-
CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed a security flaw impacting the Linux kernel in its Known Exploited Vulnerabilities (KEV) catalog, stating it has been actively exploited in the wild.The vulnerability, CVE-2023-0386 (CVSS score: 7.8), is an improper ownership bug in the Linux kernel that could be exploited to escalate privileges…
-
Veeam Patches CVE-2025-23121: Critical RCE Bug Rated 9.9 CVSS in Backup & Replication
Veeam has rolled out patches to contain a critical security flaw impacting its Backup & Replication software that could result in remote code execution under certain conditions.The security defect, tracked as CVE-2025-23121, carries a CVSS score of 9.9 out of a maximum of 10.0.”A vulnerability allowing remote code execution (RCE) on the Backup Server by…
-
Veeam Vulnerabilities Expose Backup Servers to Remote Attacks
Veeam, a leading provider of data protection and backup solutions, disclosed three critical vulnerabilities affecting its widely deployed backup software. These flaws”, assigned CVE-2025-23121, CVE-2025-24286, and CVE-2025-24287″, could allow attackers to execute code remotely or escalate privileges, posing significant risks to organizations relying on Veeam for data integrity and disaster recovery. The Vulnerabilities CVE-2025-23121: Critical…
-
Citrix NetScaler ADC Gateway Flaws Expose Sensitive Data to Hackers
Two critical vulnerabilities have been discovered in Citrix NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway), potentially exposing sensitive data to hackers and putting enterprise networks at significant risk. The flaws, identified as CVE-2025-5349 and CVE-2025-5777, have been rated with high severity, carrying CVSS base scores of 8.7 and 9.3, respectively. Summary…
-
Veeam Vulnerabilities Expose Backup Servers to Remote Attacks
Veeam, a leading provider of data protection and backup solutions, disclosed three critical vulnerabilities affecting its widely deployed backup software. These flaws”, assigned CVE-2025-23121, CVE-2025-24286, and CVE-2025-24287″, could allow attackers to execute code remotely or escalate privileges, posing significant risks to organizations relying on Veeam for data integrity and disaster recovery. The Vulnerabilities CVE-2025-23121: Critical…
-
Citrix NetScaler ADC Gateway Flaws Expose Sensitive Data to Hackers
Two critical vulnerabilities have been discovered in Citrix NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway), potentially exposing sensitive data to hackers and putting enterprise networks at significant risk. The flaws, identified as CVE-2025-5349 and CVE-2025-5777, have been rated with high severity, carrying CVSS base scores of 8.7 and 9.3, respectively. Summary…
-
ASUS Armoury Crate-Schwachstelle CVE-2025-3464 ermöglicht Admin-Privilegien in Windows
Kurze Information für Leser, die ASUS Armoury Crate auf ihren Windows-Systemen einsetzen. Die Schwachstelle CVE-2025-3464 in der Software ermöglicht es einem Angreifer Administrator-Berechtigungen unter Windows zu erlangen. ASUS hat inzwischen die Software aktualisiert, um die Schwachstellen zu schließen. Armoury Crate … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/06/18/asus-armoury-crate-schwachstelle-cve-2025-3464-ermoeglicht-admin-privilegien-in-windows/
-
Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor
A now-patched security flaw in Google Chrome was exploited as a zero-day by a threat actor known as TaxOff to deploy a backdoor codenamed Trinper.The attack, observed in mid-March 2025 by Positive Technologies, involved the use of a sandbox escape vulnerability tracked as CVE-2025-2783 (CVSS score: 8.3).Google addressed the flaw later that month after Kaspersky…
-
BeyondTrust Tools RCE Vulnerability Allows Attackers Execute Arbitrary Code
Tags: access, advisory, cve, cyber, cybersecurity, flaw, injection, rce, remote-code-execution, tool, vulnerabilityA newly disclosed vulnerability in BeyondTrust’s Remote Support (RS) and Privileged Remote Access (PRA) products has raised alarms across the cybersecurity community. The flaw, tracked as CVE-2025-5309 and detailed in advisory BT25-04, allows attackers to execute arbitrary code on affected servers via a Server-Side Template Injection (SSTI) vulnerability in the chat feature. With a CVSSv4…
-
Sicherheitsrisiko bei Salesforce Industry Cloud
Die Salesforce Industry Cloud ist mit Konfigurationsrisiken behaftet.Die vertikal ausgerichtete Lösungssuite Salesforce Industry Cloud umfasst eine Low-Code-Plattform, die vorgefertigte Tools für die digitale Transformation für bestimmte Branchen wie Finanzdienstleistungen und Fertigung bereitstellt. Forscher von AppOmni haben nun herausgefunden, dass Kunden ihre Komponenten leicht falsch konfigurieren können. Dadurch besteht die Gefahr, dass Angreifer Zugriff auf verschlüsselte…

