CVE/vulnerability

CrushFTP Vulnerability Lets Hackers Bypass Security and Seize Server ControlCrushFTP Vulnerability Lets Hackers Bypass Security and Seize Server Control

CrushFTP Vulnerability Lets Hackers Bypass Security and Seize Server Control

A newly disclosed authentication bypass vulnerability (CVE-2025-2825) in CrushFTP file transfer software enables attackers to gain complete control of servers…

3 days ago
Canon Printer Vulnerability Allows Attackers to Execute Arbitrary CodeCanon Printer Vulnerability Allows Attackers to Execute Arbitrary Code

Canon Printer Vulnerability Allows Attackers to Execute Arbitrary Code

A security vulnerability, tracked as CVE-2025-1268, has been found in certain Canon printer drivers, potentially allowing attackers to execute arbitrary code.…

3 days ago
Mitel Alerts Users to Severe XSS Vulnerability in MiContact CenterMitel Alerts Users to Severe XSS Vulnerability in MiContact Center

Mitel Alerts Users to Severe XSS Vulnerability in MiContact Center

Mitel has issued a security advisory (MISA-2025-0003) to notify users of its MiContact Center Business software about a high-severity reflected…

3 days ago
Multiple Dell Unity Vulnerabilities Allow Attackers to Compromise SystemsMultiple Dell Unity Vulnerabilities Allow Attackers to Compromise Systems

Multiple Dell Unity Vulnerabilities Allow Attackers to Compromise Systems

Dell Technologies has released a security advisory detailing multiple critical vulnerabilities in its Dell Unity storage systems and related software.…

3 days ago
New Ubuntu Linux Vulnerabilities Let Attackers Exploit Kernel ComponentsNew Ubuntu Linux Vulnerabilities Let Attackers Exploit Kernel Components

New Ubuntu Linux Vulnerabilities Let Attackers Exploit Kernel Components

A new set of security vulnerabilities discovered in Ubuntu Linux has raised concerns about kernel exploitation risks. Researchers at the…

3 days ago
GLPI ITSM Tool Flaw Allows Attackers to Inject Malicious SQL QueriesGLPI ITSM Tool Flaw Allows Attackers to Inject Malicious SQL Queries

GLPI ITSM Tool Flaw Allows Attackers to Inject Malicious SQL Queries

A critical SQL injection vulnerability, tracked as CVE-2025-24799, has been identified in GLPI, a widely used open-source IT Service Management (ITSM) tool.…

6 days ago
Synology Mail Server Vulnerability Enables Remote System Configuration TamperingSynology Mail Server Vulnerability Enables Remote System Configuration Tampering

Synology Mail Server Vulnerability Enables Remote System Configuration Tampering

Synology announced the discovery and resolution of a moderate-severity vulnerability in their Mail Server, which could allow remote authenticated attackers…

6 days ago
CISA Adds Sitecore CMS Code Execution Vulnerability to Exploited ListCISA Adds Sitecore CMS Code Execution Vulnerability to Exploited List

CISA Adds Sitecore CMS Code Execution Vulnerability to Exploited List

 The Cybersecurity and Infrastructure Security Agency (CISA) has included a critical deserialization vulnerability affecting Sitecore CMS and Experience Platform (XP).…

7 days ago
PoC Exploit Released for Ingress-NGINX RCE VulnerabilitiesPoC Exploit Released for Ingress-NGINX RCE Vulnerabilities

PoC Exploit Released for Ingress-NGINX RCE Vulnerabilities

A recently disclosed vulnerability in Ingress-NGINX, tracked as CVE-2025-1974, has raised concerns about the security of Kubernetes environments. This vulnerability…

7 days ago
Exim Use-After-Free Vulnerability Enables Privilege EscalationExim Use-After-Free Vulnerability Enables Privilege Escalation

Exim Use-After-Free Vulnerability Enables Privilege Escalation

A significant security threat has been uncovered in Exim, a popular open-source mail transfer agent (MTA) widely used in Linux…

7 days ago