CVE-2025-21605 – Redis Unauthenticated Output Buffer Overflow Vulnerability
Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does not limit the output buffer of normal clients (see […]
CVE-2024-47829 – “Pnpm MD5 Path Shortening Collision Vulnerability”
The following table lists the changes that have been made to the CVE-2024-47829 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 23, 2025 Action […]
CVE-2025-1731 and CVE-2025-1732 impacts Zyxel Firewalls
CVE-2025-1731 and CVE-2025-1732 impacts Zyxel Firewalls Zyxel has disclosed two critical vulnerabilities, CVE-2025-1731 and CVE-2025-1732, affecting its USG FLEX H series firewalls. These vulnerabilities could allow authenticated local attackers to escalat … Read more Published Date: Apr 23, 2025 (2 hours, 2 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-1732 CVE-2025-1731 CVE-2025-32433 CVE-2025-24054
CVE-2025-46393 – ImageMagick Multispectral Packet Size Overflow
The following table lists the changes that have been made to the CVE-2025-46393 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 23, 2025 Action […]
CVE-2025-45427 – Tenda AC9 Stack Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-45427 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Apr. 23, 2025 Action Type […]
CVE-2025-45428 – Tenda AC9 Stack Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-45428 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Apr. 23, 2025 Action Type […]
CVE-2025-43965 – ImageMagick MIFF Image Depth Overflow
The following table lists the changes that have been made to the CVE-2025-43965 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 23, 2025 Action […]
ASUS releases fix for AMI bug that lets hackers brick servers
ASUS releases fix for AMI bug that lets hackers brick servers ASUS has released security updates to address CVE-2024-54085, a maximum severity flaw that could allow attackers to hijack and potentially brick servers. The flaw impacts American Megatrends Internati … Read more Published Date: Apr 23, 2025 (2 hours, 55 minutes ago) Vulnerabilities has been mentioned in […]
Synology Network File System Vulnerability Let Read Any File
Synology Network File System Vulnerability Let Read Any File A severe security vulnerability in Synology’s DiskStation Manager (DSM) software has been identified. This vulnerability allows remote attackers to read arbitrary files through the Network File System … Read more Published Date: Apr 23, 2025 (3 hours, 26 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-1021
Critical Vulnerabilities in Browser Wallets Let Attackers Drain your Funds
Critical Vulnerabilities in Browser Wallets Let Attackers Drain your Funds Significant vulnerabilities in popular browser-based cryptocurrency wallets enable attackers to steal funds without any user interaction or approval. These critical flaws, discovered in wallets includ … Read more Published Date: Apr 23, 2025 (3 hours, 29 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2023-40580