CVE-2025-5419 – Google Chrome Heap Corruption Vulnerability

The following table lists the changes that have been made to the CVE-2025-5419 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2025-5068 – Google Chrome Blink Use-After-Free Vulnerability

The following table lists the changes that have been made to the CVE-2025-5068 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2025-49164 – Arris VIP1113 TV Set-Top Box Firmware Decryption Key Disclosure

The following table lists the changes that have been made to the CVE-2025-49164 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2025-49163 – Arris VIP1113 Boot Image Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-49163 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2025-49162 – Arris VIP1113 TFTP File Overwrite Vulnerability

The following table lists the changes that have been made to the CVE-2025-49162 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CISA Warns of Critical Unauthenticated Access Vulnerability in Instantel Micromate Devices

CISA Warns of Critical Unauthenticated Access Vulnerability in Instantel Micromate Devices The Cybersecurity and Infrastructure Security Agency (CISA) has issued a security advisory warning users of a critical vulnerability affecting all versions of Instantel Micromate, a popular device use … Read more Published Date: Jun 03, 2025 (3 hours, 32 minutes ago) Vulnerabilities has been mentioned in […]

CISA Adds 5 Actively Exploited Vulnerabilities to KEV Catalog: ASUS Routers, Craft CMS, and ConnectWise Targeted

CISA Adds 5 Actively Exploited Vulnerabilities to KEV Catalog: ASUS Routers, Craft CMS, and ConnectWise Targeted The Cybersecurity and Infrastructure Security Agency (CISA) has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, citing verified evidence of active exploitation in … Read more Published Date: Jun 03, 2025 (3 hours, 35 minutes ago) Vulnerabilities has […]

Chrome Zero-Day Alert: CVE-2025-5419 Actively Exploited in the Wild

Chrome Zero-Day Alert: CVE-2025-5419 Actively Exploited in the Wild Google has rolled out a critical security update for the Chrome browser in its Stable channel, bumping the version to 137.0.7151.68/.69 for Windows and Mac and 137.0.7151.68 for Linux. This patch addr … Read more Published Date: Jun 02, 2025 (2 hours, 1 minute ago) Vulnerabilities has been […]