Apple fixes zero-day exploited in ‘extremely sophisticated’ attacks
Apple fixes zero-day exploited in ‘extremely sophisticated’ attacks Apple has released emergency security updates to patch a zero-day vulnerability that the company says was exploited in targeted and “extremely sophisticated” attacks. “A physical attack may disable US … Read more Published Date: Feb 10, 2025 (1 hour, 8 minutes ago) Vulnerabilities has been mentioned in this article. […]
CVE-2025-25188 – Hickory DNS DNSSEC Trust Anchor and Key Chain Abuse Vulnerability
Hickory DNS is a Rust based DNS client, server, and resolver. A vulnerability present starting in version 0.8.0 and prior to versions 0.24.3 and 0.25.0-alpha.5 impacts Hickory DNS users relying on DNSSEC verification in the client library, stub resolver, or recursive resolver. The DNSSEC validation routines treat entire RRsets of DNSKEY records as trusted once […]
CVE-2025-1152 – GNU Binutils Remote Memory Leak
The following table lists the changes that have been made to the CVE-2025-1152 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 10, 2025 Action […]
CVE-2024-57409 – Cool-Admin-Java Stored XSS
The following table lists the changes that have been made to the CVE-2024-57409 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 10, 2025 Action […]
CVE-2024-57408 – Cool-Admin-Java RCE via File Upload
The following table lists the changes that have been made to the CVE-2024-57408 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 10, 2025 Action […]
CVE-2024-57407 – Timo File Upload RCE
The following table lists the changes that have been made to the CVE-2024-57407 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 10, 2025 Action […]
CVE-2025-1150 – “GNU Binutils LD Remote Memory Leak Vulnerability”
The following table lists the changes that have been made to the CVE-2025-1150 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 10, 2025 Action […]
CVE-2025-1151 – GNU Binutils Remote Memory Leak in ld”xmemdup”
The following table lists the changes that have been made to the CVE-2025-1151 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 10, 2025 Action […]
CVE-2025-25186 – Apache Net::IMAP Denial of Service Vulnerability
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`’s response parser. At any time while the client is connected, a malicious server can send can send highly compressed […]
CVE-2025-24892 – OpenProject HTML Injection
The following table lists the changes that have been made to the CVE-2025-24892 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 10, 2025 Action […]