Cisco has issued a new security advisory warning of newly discovered vulnerabilities in its Identity Services Engine (ISE) and ISE…
Development
New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers
TeleMessage SGNL, a made-in-Israel clone of the Signal app used by US government agencies and regulated businesses, has been found running with an outdated configuration that exposes sensitive interna …
Read more
Published Date:
Jul 17, 2025 (12 hours, 14 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-48927
CVE-2025-47729
CVE-2024-37081
CVE-2024-37080
CVE-2024-37079
ISC Warns of Cache Poisoning and Crash Risks in BIND: What You Need to Know About CVE-2025-40776 and CVE-2025-40777
The Internet Systems Consortium (ISC) has issued two security advisories addressing two high-impact vulnerabilities in BIND, its widely used Domain Name System (DNS) software. The vulnerabilities, tra …
Read more
Published Date:
Jul 18, 2025 (10 hours, 16 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-40777
CVE-2025-40776
Massistant: China’s New Mobile Forensics App Deepens Digital Surveillance
In an update to China’s expanding digital surveillance ecosystem, researchers at Lookout Threat Lab have uncovered a powerful mobile forensics application known as Massistant, believed to be a success …
Read more
Published Date:
Jul 18, 2025 (10 hours, 6 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-34300
CVE-2023-20963
CVE-2025-34300 (CVSS 10): Critical RCE Flaw in Lighthouse Studio’s CGI Scripts Threatens Survey Servers Worldwide
A severe remote code execution (RCE) vulnerability has been discovered in Lighthouse Studio, a popular web-based survey platform developed by Sawtooth Software. The flaw—tracked as CVE-2025-34300 and …
Read more
Published Date:
Jul 18, 2025 (10 hours, 1 minute ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-34300
CVE-2025-40909
CVE-2024-56406
GhostContainer: Kaspersky Uncovers Stealthy Backdoor Infiltrating Government & High-Tech Exchange Servers
In a recent incident response operation, Kaspersky Labs uncovered a highly sophisticated backdoor named GhostContainer, designed to infiltrate Microsoft Exchange infrastructure within government and h …
Read more
Published Date:
Jul 18, 2025 (9 hours, 55 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-34300
CVE-2020-0688
CVE-2025-20337: Cisco ISE Critical RCE Vulnerability
Skip to content
July 18, 2025SummaryCVE-2025-20337 is a critical remote code execution (RCE) vulnerability affecting Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE- …
Read more
Published Date:
Jul 18, 2025 (5 hours, 39 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-20337
CVE-2025-6558
CVE-2025-20282
CVE-2025-20281
CVE-2025-32896
CVE-2025-20156
BIND 9 Vulnerabilities Expose Organizations to Cache Poisoning and DoS Attacks
Two critical vulnerabilities in the BIND 9 DNS resolver software are affecting organizations worldwide, with potential cache poisoning and denial-of-service attacks.
The vulnerabilities, identified as …
Read more
Published Date:
Jul 18, 2025 (2 hours, 19 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-40777
CVE-2025-40776
Grafana Patches XSS (CVE-2025-6023) and Open Redirect (CVE-2025-6197) Flaws in Recent Security Release
Grafana Labs has released important security patches for multiple versions of its observability platform, addressing two significant vulnerabilities: a high-severity Cross-Site Scripting (XSS) vulnera …
Read more
Published Date:
Jul 18, 2025 (1 hour, 8 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-6197
CVE-2025-6023
CVE-2025-3415
CVE-2021-43798
Google Sues BadBox 2.0 Botnet Operators, Protecting 10 Million+ Infected Android Devices
In response to the escalating wave of cybersecurity threats, Google has filed a lawsuit against the operators behind BadBox 2.0—reportedly one of the world’s largest botnets leveraging smart TVs. The …
Read more
Published Date:
Jul 18, 2025 (59 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-6197
CVE-2025-6023
CVE-2024-43093
Amazon’s AI Boom Collides with Climate Pledge: Carbon Emissions Soar 6%
As the generative AI boom continues to reshape the tech industry, Amazon has doubled down on its investments in expanding the necessary infrastructure. However, its latest sustainability report reveal …
Read more
Published Date:
Jul 18, 2025 (49 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2023-20858
CVE ID : CVE-2025-7767
Published : July 18, 2025, 1:15 a.m. | 4 hours, 59 minutes ago
Description : A vulnerability, which was classified as problematic, has been found in PHPGurukul Art Gallery Management System 1.1. Affected by this issue is some unknown functionality of the file /admin/edit-art-medium-detail.php. The manipulation of the argument artmed leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity: 3.5 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-7431
Published : July 18, 2025, 2:15 a.m. | 3 hours, 59 minutes ago
Description : The Knowledge Base plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin slug setting in all versions up to, and including, 2.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Severity: 4.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-3740
Published : July 18, 2025, 5:15 a.m. | 59 minutes ago
Description : The School Management System for Wordpress plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 93.1.0 via the ‘page’ parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The Local File Inclusion exploit can be chained to include various dashboard view files in the plugin. One such chain can be leveraged to update the password of Super Administrator accounts in Multisite environments making privilege escalation possible. The vendor has updated the version numbers beginning with `1.93.1 (02-07-2025)` for the patched version. This version comes after version 93.1.0.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-5816
Published : July 18, 2025, 5:15 a.m. | 59 minutes ago
Description : The Plugin Pengiriman WooCommerce Kurir Reguler, Instan, Kargo – Biteship plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.2.0 via the get_order_detail() due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user’s orders.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-6781
Published : July 18, 2025, 5:15 a.m. | 59 minutes ago
Description : The Copymatic – AI Content Writer & Generator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1. This is due to missing or incorrect nonce validation on the ‘copymatic-menu’ page. This makes it possible for unauthenticated attackers to update the copymatic_apikey option via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-6053
Published : July 18, 2025, 5:15 a.m. | 59 minutes ago
Description : The Zuppler Online Ordering plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.0. This is due to missing or incorrect nonce validation on the ‘zuppler-online-ordering-options’ page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-7648
Published : July 18, 2025, 5:15 a.m. | 59 minutes ago
Description : The Ruven Themes: Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘ruven_button’ shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-6813
Published : July 18, 2025, 5:15 a.m. | 59 minutes ago
Description : The aapanel WP Toolkit plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization checks within the auto_login() function in versions 1.0 to 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to bypass all role checks and gain full admin privileges.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-7638
Published : July 18, 2025, 5:15 a.m. | 59 minutes ago
Description : The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to time-based SQL Injection via the `order_by` parameter in all versions up to, and including, 1.45.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Severity: 4.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more…