Microsoft Patch Tuesday for February Includes Two Zero Days Under Attack

Microsoft Patch Tuesday for February Includes Two Zero Days Under Attack Microsoft’s Patch Tuesday for February 2025 fixes four zero-day vulnerabilities, including two under active attack, plus another eight flaws judged to be at high risk of attack. In all, the Patch Tues … Read more Published Date: Feb 12, 2025 (2 hours ago) Vulnerabilities has […]

Ivanti fixes three critical flaws in Connect Secure & Policy Secure

Ivanti fixes three critical flaws in Connect Secure & Policy Secure Ivanti has released security updates for Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS), and Ivanti Secure Access Client (ISAC) to address multiple vulnerabilities, including three critical s … Read more Published Date: Feb 12, 2025 (2 hours, 40 minutes ago) Vulnerabilities has been mentioned in […]

CVE-2025-25746 – D-Link DIR-853 Stack-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-25746 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]

CVE-2025-25744 – D-Link DIR-853 Stack-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-25744 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]

CVE-2025-25743 – D-Link DIR-853 Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-25743 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]

CVE-2025-25742 – D-Link DIR-853 Stack-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-25742 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]

CVE-2025-25184 – Rack Common Logger CRLF Injection Vulnerability

Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.11, 3.0.12, and 3.1.11, Rack::CommonLogger can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs. When a user provides the authorization credentials via Rack::Auth::Basic, if success, the username will […]

CVE-2025-25182 – Stroom ALB Authentication Bypass and SSRF Vulnerability

Stroom is a data processing, storage and analysis platform. A vulnerability exists starting in version 7.2-beta.53 and prior to versions 7.2.24, 7.3-beta.22, 7.4.4, and 7.5-beta.2 that allows authentication bypass to a Stroom system when configured with ALB and installed in a way that the application is accessible not through the ALB itself. This vulnerability may […]

CVE-2025-0919 – Apache HTTP Server Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-0919 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Feb. 12, 2025 Action Type […]

CVE-2025-1210 – Wazifa System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-1210 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]