CVE-2025-0637 – Beta10 Full Path Traversal Authorization Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-0637 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 23, 2025 Action […]
CVE-2024-52325 – ECOVACS Robot BLE Command Injection
The following table lists the changes that have been made to the CVE-2024-52325 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 9119a7d8-5eab-497f-8521-727c672e3725 Jan. 23, 2025 Action […]
SonicWall warns of SMA1000 RCE flaw exploited in zero-day attacks
SonicWall warns of SMA1000 RCE flaw exploited in zero-day attacks SonicWall is warning about a pre-authentication deserialization vulnerability in SonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), with reports that it has bee … Read more Published Date: Jan 23, 2025 (1 hour, 24 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-23006 CVE-2024-53704
Stealthy ‘Magic Packet’ malware targets Juniper VPN gateways
Stealthy ‘Magic Packet’ malware targets Juniper VPN gateways A malicious campaign has been specifically targeting Juniper edge devices, many acting as VPN gateways, with malware dubbed J-magic that starts a reverse shell only if it detects a “magic packet” in t … Read more Published Date: Jan 23, 2025 (1 hour, 42 minutes ago) Vulnerabilities has been […]
Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits
Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits Firmware Security / Vulnerability An exhaustive evaluation of three firewall models from Palo Alto Networks has uncovered a host of known security flaws impacting the devices’ firmware as well as misc … Read more Published Date: Jan 23, 2025 (1 hour, 56 minutes ago) Vulnerabilities […]
CVE-2025-0314 impacts GitLab
CVE-2025-0314 impacts GitLab CVE-2025-0314 is a high-severity cross-site scripting (XSS) vulnerability identified in GitLab, a widely used platform for version control, CI/CD, and DevOps. This vulnerability enables attackers to i … Read more Published Date: Jan 23, 2025 (1 hour, 28 minutes ago) Vulnerabilities has been mentioned in this article.
CVE-2024-10539 – Uyumsoft ERP Uyumsoft Information Systems Cross-site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2024-10539 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-57947 – Linux Kernel Netfilter Pipapo Pointer Leaking Vulnerability
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_set_pipapo: fix initial map fill The initial buffer has to be inited to all-ones, but it must restrict it to the size of the first field, not the total field size. After each round in the map search step, the result and the fill […]
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest Date: 1.23.25 Top Headlines New GhostGPT AI Chatbot Facilitates Malware Creation and Phishing Summary: Cybercriminals are selling access to a new malicious generative AI chatbot called GhostGPT. The … Read more Published Date: Jan 23, 2025 (2 hours, 47 minutes ago) Vulnerabilities has been mentioned in this article.
CVE-2025-20156 impacts Cisco Meeting Management
CVE-2025-20156 impacts Cisco Meeting Management CVE-2025-20156 is a critical vulnerability within the REST API of Cisco Meeting Management. This vulnerability allows a remote, authenticated attacker with low privileges to elevate their access right … Read more Published Date: Jan 23, 2025 (2 hours, 48 minutes ago) Vulnerabilities has been mentioned in this article.