CVE-2025-48958 – Froxlor HTML Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-48958 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]
CVE-2025-48957 – AstrBot Path Traversal Vulnerability
AstrBot is a large language model chatbot and development framework. A path traversal vulnerability present in versions 3.4.4 through 3.5.12 may lead to information disclosure, such as API keys for LLM providers, account passwords, and other sensitive data. The vulnerability has been addressed in Pull Request #1676 and is included in version 3.5.13. As a […]
CVE-2025-48955 – “Para Exposes Access and Secret Keys in Logs”
The following table lists the changes that have been made to the CVE-2025-48955 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]
CVE-2025-46807 – SSLH File Descriptor Exhaustion Denial of Service
The following table lists the changes that have been made to the CVE-2025-46807 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]
Qualcomm waarschuwt voor misbruik van GPU-lekken in Androidtelefoons
Qualcomm waarschuwt voor misbruik van GPU-lekken in Androidtelefoons Chipfabrikant Qualcomm waarschuwt vandaag voor drie actief aangevallen GPU-lekken in Androidtelefoons. De kwetsbaarheden (CVE-2025-21479, CVE-2025-21480 en CVE-2025-27038) bevinden zich in de Adreno G … Read more Published Date: Jun 02, 2025 (2 hours, 35 minutes ago) Vulnerabilities has been mentioned in this article.
⚡ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More
⚡ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More Cybersecurity / Hacking News If this had been a security drill, someone would’ve said it went too far. But it wasn’t a drill—it was real. The access? Everything looked normal. The tools? Easy to find. … Read more Published Date: Jun 02, […]
CVE-2025-5442 – Linksys Router Os Command Injection Vulnerability
A vulnerability, which was classified as critical, has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function RP_pingGatewayByBBS of the file /goform/RP_pingGatewayByBBS. The manipulation of the argument ip/nm/gw leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public […]
CVE-2025-5441 – Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 Os Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-5441 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]
CVE-2025-48494 – Gokapi Stored Cross-Site Scripting Vulnerability
Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. When using end-to-end encryption, a stored cross-site scripting vulnerability can be exploited by uploading a file with JavaScript code embedded in the filename. After upload and every time someone opens the upload list, the script is then parsed. Prior to version 2.0.0, […]
CVE-2025-47289 – CE Phoenix Stored Cross-Site Scripting (XSS) Vulnerability
The following table lists the changes that have been made to the CVE-2025-47289 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]