CISA Adds Qualcomm Vulnerabilities to KEV Catalog

CISA Adds Qualcomm Vulnerabilities to KEV Catalog On June 3, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) expanded its Known Exploited Vulnerabilities (KEV) Catalog to include three newly discovered and actively exploited vu … Read more Published Date: Jun 04, 2025 (1 hour, 42 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-21479 CVE-2025-27038 […]

CVE-2025-5594 – FreeFloat FTP Server SET Command Handler Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-5594 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]

CVE-2025-5593 – FreeFloat FTP Server Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-5593 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]

CVE-2025-29094 – Motivian Content Management System Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-29094 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]

CVE-2025-29093 – Motivian Content Mangment System Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-29093 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]

CVE-2025-23106 – Samsung Mobile Processor Exynos Use-After-Free Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-23106 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]

CVE-2025-23101 – Samsung Mobile Processor Exynos UAF Vulnerability

The following table lists the changes that have been made to the CVE-2025-23101 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]

CVE-2025-23096 – Samsung Exynos Double Free Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-23096 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]

CVE-2025-23095 – Samsung Mobile Processor Exynos Double Free Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-23095 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]

The Bitter End: Unraveling Eight Years of Espionage Antics—Part One

The Bitter End: Unraveling Eight Years of Espionage Antics—Part One June 04, 2025 Nick Attfield and Konstantin Klinger in collaboration with Threatray’s Abdallah Elshinbary and Jonas Wagner This is a two-part blog series, detailing research undertaken in collaboration … Read more Published Date: Jun 04, 2025 (10 hours, 12 minutes ago) Vulnerabilities has been mentioned in this […]