CVE-2025-3009 – Jinher Network OA C6 SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-3009 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 31, 2025 Action […]

CVE-2025-21893 – Linux Kernel Keyring Use After Free (UAF) Vulnerability

In the Linux kernel, the following vulnerability has been resolved: keys: Fix UAF in key_put() Once a key’s reference count has been reduced to 0, the garbage collector thread may destroy it at any time and so key_put() is not allowed to touch the key after that point. The most key_put() is normally allowed to […]

Microsoft uses AI to find flaws in GRUB2, U-Boot, Barebox bootloaders

Microsoft uses AI to find flaws in GRUB2, U-Boot, Barebox bootloaders Microsoft used its AI-powered Security Copilot to discover 20 previously unknown vulnerabilities in the GRUB2, U-Boot, and Barebox open-source bootloaders. GRUB2 (GRand Unified Bootloader) is the defa … Read more Published Date: Mar 31, 2025 (2 hours, 46 minutes ago) Vulnerabilities has been mentioned in this article. […]

CISA Details New Malware Used in Ivanti Attacks

CISA Details New Malware Used in Ivanti Attacks The U.S. Cybersecurity and Information Security Agency (CISA) has issued an advisory detailing a new malware variant detected in attacks on an Ivanti vulnerability. The CISA advisory says the agency r … Read more Published Date: Mar 31, 2025 (3 hours, 14 minutes ago) Vulnerabilities has been mentioned in […]

CVE-2025-3008 – Novastar CX40 NetFilter Utility Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-3008 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 31, 2025 Action […]

CVE-2025-3007 – Novastar CX40 Stack-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-3007 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 31, 2025 Action […]

CVE-2025-31129 – Jooby Deserialization Vulnerability

The following table lists the changes that have been made to the CVE-2025-31129 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 31, 2025 Action […]

CVE-2025-31128 – Gifplayer Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-31128 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 31, 2025 Action […]

CVE-2025-29908 – Netty QUIC Hash Collision Denial of Service

The following table lists the changes that have been made to the CVE-2025-29908 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 31, 2025 Action […]

CVE-2025-3005 – Sayski ForestBlog Friend Link Handler Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-3005 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 31, 2025 Action […]