CVE-2025-21421 – Apache HTTP Server Buffer Overflow
The following table lists the changes that have been made to the CVE-2025-21421 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]
CVE-2024-49848 – Qualcomm Snapdragon DSP IOCTL Memory Corruption Vulnerability
The following table lists the changes that have been made to the CVE-2024-49848 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]
CVE-2024-45557 – Intel TME Memory Corruption Vulnerability
The following table lists the changes that have been made to the CVE-2024-45557 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]
CVE-2024-45552 – VivoLink Video Call RTCP Packet Information Disclosure
The following table lists the changes that have been made to the CVE-2024-45552 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]
CVE-2024-45556 – Texas Instruments TCSR Linux Cryptographic Access Control Vulnerability
The following table lists the changes that have been made to the CVE-2024-45556 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]
Remix and React Router Vulnerability CVE-2025–31137 -$$$$ BOUNTY
Remix and React Router Vulnerability CVE-2025–31137 -$$$$ BOUNTY Disclaimer: This document is for educational purposes only. Exploiting systems without authorization is illegal and punishable by law.Stay ethical. Stay legal. Secure responsibly.Thanks, Everyone for … Read more Published Date: Apr 07, 2025 (1 hour, 56 minutes ago) Vulnerabilities has been mentioned in this article.
CVE-2025-3347 – Code-projects Patient Record Management System Sql Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-3347 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]
CVE-2025-3346 – Tenda AC7 PPTP Server Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-3346 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]
How ToddyCat tried to hide behind AV software
How ToddyCat tried to hide behind AV software To hide their activity in infected systems, APT groups resort to various techniques to bypass defenses. Most of these techniques are well known and detectable by both EPP solutions and EDR threat-moni … Read more Published Date: Apr 07, 2025 (2 hours, 16 minutes ago) Vulnerabilities has been mentioned […]
New Sakura RAT Emerges on GitHub, Successfully Evading AV & EDR Protections
New Sakura RAT Emerges on GitHub, Successfully Evading AV & EDR Protections A new Remote Access Trojan (RAT) called Sakura has been published on GitHub. Due to its sophisticated anti-detection capabilities and comprehensive system control features, Sakura is raising significa … Read more Published Date: Apr 07, 2025 (2 hours, 42 minutes ago) Vulnerabilities has been mentioned […]