CVE-2024-45712 – SolarWinds Serv-U Client-Side Cross-Site Scripting (XSS) Vulnerability
The following table lists the changes that have been made to the CVE-2024-45712 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
Android to Auto-Reboot After 72 Hours of Inactivity
Android to Auto-Reboot After 72 Hours of Inactivity Previously, Apple introduced an automatic reboot feature to iPhones via iOS security updates—a security mechanism designed to help protect user data by triggering a reboot if the device remains locked … Read more Published Date: Apr 15, 2025 (2 hours, 45 minutes ago) Vulnerabilities has been mentioned in this […]
Google Ends Security Updates for Android 12
Google Ends Security Updates for Android 12 Photo by Daniel Romero on <a href="https://unsplash.com/wallpapers/android?utm_source=unsp … Read more Published Date: Apr 15, 2025 (2 hours, 51 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2023-21085
Android 15 Requires Minimum 32GB Storage
Android 15 Requires Minimum 32GB Storage Google recently announced that starting with Android 15, the minimum required device storage will be raised to 32GB. This means that all Android smartphones and tablets must offer at least 32GB of onb … Read more Published Date: Apr 15, 2025 (2 hours, 59 minutes ago) Vulnerabilities has been mentioned in […]
Samsung Halts One UI 7 Rollout Due to Lockscreen Issues
Samsung Halts One UI 7 Rollout Due to Lockscreen Issues One UI 7, based on Android 15, represents one of Samsung’s most significant updates in recent years. Deeply integrated with advanced AI capabilities, One UI 7 is designed to enhance user efficiency an … Read more Published Date: Apr 15, 2025 (1 hour ago) Vulnerabilities has […]
Apache Roller Vulnerability Let Attackers Gain Unauthorized Access
Apache Roller Vulnerability Let Attackers Gain Unauthorized Access A critical security vulnerability in Apache Roller has been discovered, allowing attackers to maintain unauthorized access to blog systems even after password changes. The vulnerability, CVE-2025-2485 … Read more Published Date: Apr 15, 2025 (1 hour, 15 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-24859 CVE-2014-0030 CVE-2013-4212
DOGE BIG BALLS Campaign Blurs Lines Between Exploitation, Recon, and Reputation Damage
DOGE BIG BALLS Campaign Blurs Lines Between Exploitation, Recon, and Reputation Damage Cyble researchers have uncovered ransomware called DOGE BIG BALLS, a ransomware that not just stands out but also presents its technical prowess for audacious psychological manipulation. This malware … Read more Published Date: Apr 15, 2025 (2 hours, 36 minutes ago) Vulnerabilities has been mentioned […]
Samsung Galaxy S24 Vulnerability Let Create Arbitrary Files on Affected Installations
Samsung Galaxy S24 Vulnerability Let Create Arbitrary Files on Affected Installations A significant vulnerability in Samsung Galaxy S24 devices that allows network-adjacent attackers to create arbitrary files on affected installations. The flaw, identified as CVE-2024-49421, was public … Read more Published Date: Apr 15, 2025 (54 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-49421 […]
CVE-2025-3576 – Kerberos MIT RC4-MD5 GSSAPI Spoofing Vulnerability
The following table lists the changes that have been made to the CVE-2025-3576 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
CVE-2025-3622 – Xorbits Inference Deserialization Vulnerability
The following table lists the changes that have been made to the CVE-2025-3622 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]