CVE-2025-24270 – Apple macOS Network Information Leakage Vulnerability

This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may be able to leak sensitive user information.

CVE-2025-24252 – Apple macOS Use-After-Free Vulnerability

A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may be able to corrupt process memory.

CVE-2025-24251 – Apple Local Network App Termination Vulnerability

The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, watchOS 11.4, visionOS 2.4. An attacker on the local network may cause an unexpected app termination.

CVE-2025-24206 – Apple Local Network Authentication Bypass

An authentication issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may be able to bypass authentication policy.

CVE-2018-13372 – Apache HTTP Server Unvalidated User Input

The following table lists the changes that have been made to the CVE-2018-13372 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Apr. 29, 2025 Action Type […]

CVE-2017-7740 – Apache HTTP Server Cross-Site Request Forgery

The following table lists the changes that have been made to the CVE-2017-7740 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Apr. 29, 2025 Action Type […]

Android Show: Google to Unveil OS Future Before I/O 2025

Android Show: Google to Unveil OS Future Before I/O 2025 Ahead of the Google I/O 2025 conference, scheduled to commence on May 20th (Pacific Time), Google will host a special edition “Android Show” event on May 13th at 1 PM Eastern Time to unveil the future … Read more Published Date: Apr 29, 2025 (3 hours, […]

0-Click NTLM Authentication Bypass Hits Microsoft Telnet Server, PoC Releases, No Patch

0-Click NTLM Authentication Bypass Hits Microsoft Telnet Server, PoC Releases, No Patch A severe vulnerability affecting Microsoft Telnet Server has been uncovered, allowing remote attackers to completely bypass authentication and gain administrator access without valid credentials. Deta … Read more Published Date: Apr 29, 2025 (2 hours, 17 minutes ago) Vulnerabilities has been mentioned in this article. […]

Apache Tomcat Security Update Fixes DoS and Rewrite Rule Bypass Flaws

Apache Tomcat Security Update Fixes DoS and Rewrite Rule Bypass Flaws The Apache Software Foundation has released important security updates to address two vulnerabilities affecting multiple versions of Apache Tomcat, the widely used open-source Java Servlet container. … Read more Published Date: Apr 29, 2025 (2 hours, 34 minutes ago) Vulnerabilities has been mentioned in this article. […]

CVE-2025-21756: How a Tiny Linux Kernel Bug Led to a Full Root Exploit, PoC Releases

CVE-2025-21756: How a Tiny Linux Kernel Bug Led to a Full Root Exploit, PoC Releases In a recently analysis, security researcher Michael Hoefler has exposed the full depth of CVE-2025-21756, a Use-After-Free (UAF) vulnerability affecting the Linux kernel’s vsock subsystem. What began … Read more Published Date: Apr 29, 2025 (1 hour, 23 minutes ago) Vulnerabilities has […]