CVE-2025-2953 – PyTorch Denial of Service (DoS) in torch.mkldnn_max_pool2d

The following table lists the changes that have been made to the CVE-2025-2953 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 30, 2025 Action […]

Apache Tomcat Vulnerability (CVE-2025-24813) Exploited to Execute Code on Servers

Apache Tomcat Vulnerability (CVE-2025-24813) Exploited to Execute Code on Servers A critical vulnerability in Apache Tomcat has been actively exploited by attackers to achieve remote code execution (RCE) on vulnerable servers. This vulnerability affects versions 9.0.0-M1 to 9.0.98, … Read more Published Date: Mar 30, 2025 (2 hours ago) Vulnerabilities has been mentioned in this article. […]

CVE-2025-2952 – Bluestar Micro Mall Unrestricted File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2025-2952 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 30, 2025 Action […]

CVE-2025-2951 – Bluestar Micro Mall SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-2951 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 30, 2025 Action […]

RESURGE Malware: Exploiting Ivanti Vulnerability

RESURGE Malware: Exploiting Ivanti Vulnerability The RESURGE malware is a highly sophisticated and evolving cyber threat that targets specific vulnerabilities in Ivanti’s products, particularly Ivanti Connect Secure (ICS) appliances. This malware ha … Read more Published Date: Mar 30, 2025 (1 hour, 52 minutes ago) Vulnerabilities has been mentioned in this article.

CVE-2025-1861 – Apache HTTP Server URL Truncation Vulnerability

In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when parsing HTTP redirect in the response to an HTTP request, there is currently limit on the location value size caused by limited size of the location buffer to 1024. However as per RFC9110, the limit is […]

CVE-2025-1736 – Apache PHP Header Injection

The following table lists the changes that have been made to the CVE-2025-1736 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 30, 2025 Action […]

CVE-2025-1734 – Apache HTTP Server Header Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-1734 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 30, 2025 Action […]

CVE-2025-1219 – Apache HTTP Server PHP DOM XML Charset Bypass

In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when requesting a HTTP resource using the DOM or SimpleXML extensions, the wrong content-type header is used to determine the charset when the requested resource performs a redirect. This may cause the resulting document to be parsed incorrectly […]