CVE-2025-0374 – Pi Viola etcupdate Etcupdate Version Preservation Vulnerability

The following table lists the changes that have been made to the CVE-2025-0374 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 30, 2025 Action […]

CVE-2025-0373 – NFS Server VOP_VPTOFH Stack Buffer Overflow

On 64-bit systems, the implementation of VOP_VPTOFH() in the cd9660, tarfs and ext2fs filesystems overflows the destination FID buffer by 4 bytes, a stack buffer overflow. A NFS server that exports a cd9660, tarfs, or ext2fs file system can be made to panic by mounting and accessing the export with an NFS client. Further exploitation […]

89% of AI-powered APIs rely on insecure authentication mechanisms

89% of AI-powered APIs rely on insecure authentication mechanisms APIs have emerged as the predominant attack surface over the past year, with AI being the biggest driver of API security risks, according to Wallarm. “Based on our findings, what is clear is that API … Read more Published Date: Jan 30, 2025 (2 hours, 40 minutes ago) […]

CVE-2025-0849 – CampCodes School Management Software Remote Unauthorized Access Vulnerability

The following table lists the changes that have been made to the CVE-2025-0849 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 30, 2025 Action […]

CVE-2025-0847 – “1000 Projects Employee Task Management System SQL Injection Vulnerability”

The following table lists the changes that have been made to the CVE-2025-0847 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 30, 2025 Action […]

CVE-2025-0848 – Tenda A18 HTTP POST Request Handler Stack-Based Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-0848 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 30, 2025 Action […]

CVE-2025-0846 – “1000 Projects Employee Task Management System SQL Injection Vulnerability”

The following table lists the changes that have been made to the CVE-2025-0846 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 30, 2025 Action […]

CISA adds Apple vulnerability CVE-2025-24085 to KEV Catalog

CISA adds Apple vulnerability CVE-2025-24085 to KEV Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.CVE-2025-24085 Apple Multiple Products Use-After-Free VulnerabilityCVE-202 … Read more Published Date: Jan 30, 2025 (1 hour, 55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-22217 CVE-2025-0065 CVE-2025-24085 CVE-2023-43770

Quorum onQ OS – 6.0.0.5.2064 | Reflected Cross Site Scripting (XSS) | CVE-2024-44449

Quorum onQ OS – 6.0.0.5.2064 | Reflected Cross Site Scripting (XSS) | CVE-2024-44449 Full Disclosure mailing list archives From: Shaikh Shahnawaz Date: Tue, 28 Jan 2025 13:43:53 +0400 [+] Credits: Shahnawaz Shaikh, Security Researcher at Cybergate Defens … Read more Published Date: Jan 30, 2025 (2 hours ago) Vulnerabilities has been mentioned in this article.

New Aquabotv3 botnet malware targets Mitel command injection flaw

New Aquabotv3 botnet malware targets Mitel command injection flaw A new variant of the Mirai-based botnet malware Aquabot has been observed actively exploiting CVE-2024-41710, a command injection vulnerability in Mitel SIP phones. The activity was discovered by Akam … Read more Published Date: Jan 30, 2025 (2 hours, 5 minutes ago) Vulnerabilities has been mentioned in this […]