Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point Zscaler and NetSkope

Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point Zscaler and NetSkope Critical cybersecurity vulnerabilities have been identified in enterprise-level Zero Trust Network Access solutions, potentially enabling malicious actors to breach corporate networks with relative ea … Read more Published Date: Aug 11, 2025 (1 hour, 31 minutes ago) Vulnerabilities has been mentioned in this article. […]

CVE-2025-8841 – Zlt2000 Microservices-Platform Unrestricted File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2025-8841 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]

CVE-2025-8840 – jshERP Unauthenticated Remote Code Execution

The following table lists the changes that have been made to the CVE-2025-8840 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]

WinRAR zero day exploited by RomCom hackers in targeted attacks

WinRAR zero day exploited by RomCom hackers in targeted attacks ESET researchers have discovered a previously unknown vulnerability in WinRAR, exploited in the wild by Russia-aligned group RomCom. If you use WinRAR or related components such as the Windows version … Read more Published Date: Aug 11, 2025 (2 hours, 19 minutes ago) Vulnerabilities has been mentioned […]

Over 29,000 Exchange servers unpatched against high-severity flaw

Over 29,000 Exchange servers unpatched against high-severity flaw Over 29,000 Exchange servers exposed online remain unpatched against a high-severity vulnerability that can let attackers move laterally in Microsoft cloud environments, potentially leading to complet … Read more Published Date: Aug 11, 2025 (33 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-53786

CVE-2025-8853 – 2100 Technology Official Document Management System Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-8853 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]

CVE-2025-8839 – jshERP Remote Authorization Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-8839 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]

CVE-2025-8838 – WinterChenS my-site PreHandle Uri Improper Authentication Remote Vulnerability

The following table lists the changes that have been made to the CVE-2025-8838 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]

Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks

Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks An urgent security update has been released for Xerox FreeFlow Core software, addressing two critical vulnerabilities that could allow attackers to execute remote code and perform server-side request … Read more Published Date: Aug 11, 2025 (2 hours, 57 minutes ago) Vulnerabilities has been mentioned in this article. […]

CVE-2025-8837 – JasPer JPEG2000 File Handler Use After Free Vulnerability

The following table lists the changes that have been made to the CVE-2025-8837 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]