From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news
Ook Nederland is doelwit geweest van de wereldwijde cyberspionagecampagne van de Chinese hackorganisatie Salt Typhoon. Dat melden de Nederlandse inlichtingen- en veiligheidsdiensten MIVD en AIVD vandaag.
A vulnerability described as very critical has been identified in ABB ASPECT-Enterprise, NEXUS and MATRIX up to 3.07.02. Affected by this vulnerability is an unknown functionality. Such manipulation leads to use of default password.
This vulnerability is uniquely identified as CVE-2024-51555. The attack can be launched remotely. No exploit exists.
A vulnerability has been found in Saoshyant Element Plugin up to 1.2 on WordPress and classified as problematic. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2024-51646. The attack can be initiated remotely. There is not any exploit available.
A vulnerability categorized as problematic has been discovered in IBM OpenPages 9.0. Affected by this vulnerability is an unknown functionality of the component Configuration Handler. The manipulation results in improper ownership management.
This vulnerability was named CVE-2024-43176. The attack may be performed from a remote location. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in Silabs USBXpress 4 SDK up to 4.0.3. Affected by this issue is some unknown functionality. Executing manipulation can lead to uncontrolled search path.
This vulnerability is tracked as CVE-2024-9497. The attack is restricted to local execution. No exploit exists.
A vulnerability was found in Intel 800 Ethernet Driver up to 1.15.3. It has been classified as problematic. The affected element is an unknown function of the component Linux Kernel Mode Driver Handler. Performing manipulation results in incorrect execution-assigned permissions.
This vulnerability is reported as CVE-2024-39286. The attack requires a local approach. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability categorized as problematic has been discovered in Exasol 24.2.0. This issue affects some unknown processing of the component JDBC Driver. The manipulation results in injection.
This vulnerability is cataloged as CVE-2024-55551. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in WP ULike Pro Plugin up to 1.8.7/1.9.3/1.9.4 on WordPress. It has been rated as problematic. Affected by this vulnerability is the function WP_Ulike_Pro_File_Uploader. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-9648. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability described as problematic has been identified in Pronamic Google Maps Plugin up to 2.4.1 on WordPress. Impacted is an unknown function. Executing manipulation of the argument Description can lead to cross site scripting.
The identification of this vulnerability is CVE-2025-9352. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Video Share VOD Plugin up to 2.7.6 on WordPress. The affected element is the function adminExport. The manipulation leads to cross-site request forgery.
This vulnerability is referenced as CVE-2025-7812. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability has been found in UsersWP Plugin up to 1.2.42 on WordPress and classified as problematic. Affected is the function uwp_profile_header of the component Shortcode Handler. Performing manipulation results in cross site scripting.
This vulnerability is cataloged as CVE-2025-9344. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Beaver Builder Plugin up to 2.9.2.1 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. Executing manipulation of the argument fl_builder can lead to cross site scripting.
This vulnerability is registered as CVE-2025-8897. It is possible to launch the attack remotely. No exploit is available.
A vulnerability, which was classified as very critical, was found in Plex Media Server up to 1.42.0.x. Affected is an unknown function. Such manipulation leads to incorrect resource transfer.
This vulnerability is traded as CVE-2025-34158. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in Silabs SiSDK up to 2024.6.2. Affected is an unknown function of the component APS Layer. Executing manipulation can lead to buffer overflow.
The identification of this vulnerability is CVE-2024-6352. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in Rezgo Plugin up to 4.15 on WordPress. It has been classified as problematic. The impacted element is an unknown function. The manipulation leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is documented as CVE-2024-53800. The attack can be initiated remotely. There is not any exploit available.
A vulnerability has been found in deerwms deer-wms-2 up to 3.3 and classified as critical. Impacted is an unknown function of the file /system/role/authUser/allocatedList. This manipulation of the argument params[dataScope] causes sql injection.
The identification of this vulnerability is CVE-2025-8125. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.