The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider's (MSP) SimpleHelp remote monitoring and management (RMM) tool, and then leveraged it to exfiltrate data and drop the locker on multiple endpoints.
It's believed that the attackers exploited a trio of security flaws in SimpleHelp (CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726) that were
A vulnerability has been found in PCMan FTP Server 2.0.7 and classified as critical. This vulnerability affects unknown code of the component NLST Command Handler. The manipulation leads to buffer overflow.
This vulnerability was named CVE-2025-5331. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in FreeFloat FTP Server 1.0. This affects an unknown part of the component RETR Command Handler. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2025-5330. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, has been found in Strapi up to 4.25.1. Affected by this issue is some unknown functionality of the component Webhooks URL Handler. The manipulation leads to server-side request forgery.
This vulnerability is handled as CVE-2024-52588. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in freescout-help-desk freescout up to 1.8.177. Affected by this vulnerability is an unknown functionality. The manipulation of the argument as leads to format string.
This vulnerability is known as CVE-2025-48388. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Teltonika RMS up to 5.6. Affected is an unknown function of the component Pending Invite Handler. The manipulation leads to privilege escalation.
This vulnerability is traded as CVE-2025-4687. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Redis up to 8.0.1. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2025-27151. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.