CVE-2025-8817 – Linksys RE Series Stack-Based Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-8817 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]
New ‘Win-DoS’ Zero-Click Vulnerabilities Turns Windows Server/Endpoint, Domain Controllers Into DDoS Botnet
New ‘Win-DoS’ Zero-Click Vulnerabilities Turns Windows Server/Endpoint, Domain Controllers Into DDoS Botnet LAS VEGAS — At the DEF CON 33 security conference, researchers Yair and Shahak Morag of SafeBreach Labs unveiled a new class of denial-of-service (DoS) attacks, dubbed the “Win-DoS Epidemic.” The duo … Read more Published Date: Aug 10, 2025 (1 hour, 39 minutes ago) […]
New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP
New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP Aug 10, 2025Ravie LakshmananVulnerability / Network Security A novel attack technique could be weaponized to rope thousands of public domain controllers (DCs) around the world to create a malicious … Read more Published Date: Aug 10, 2025 (1 hour, 41 minutes ago) […]
CVE-2025-8816 – Linksys Wireless Router Stack-Based Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-8816 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]
CVE-2025-8815 – Shiro Configuration Path Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-8815 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]
CVE-2025-8814 – Atjiu Pybbs Cross-Site Request Forgery Vulnerability
The following table lists the changes that have been made to the CVE-2025-8814 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]
CVE-2025-8813 – Atjiu Pybbs Open Redirect Vulnerability
The following table lists the changes that have been made to the CVE-2025-8813 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]
CVE-2025-8812 – Atjiu Pybbs Admin Panel Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-8812 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]
CVE-2025-8811 – Apache Solr SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-8811 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]
CVE-2025-8810 – Tenda AC20 Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-8810 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]