Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point Zscaler and NetSkope
Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point Zscaler and NetSkope Critical cybersecurity vulnerabilities have been identified in enterprise-level Zero Trust Network Access solutions, potentially enabling malicious actors to breach corporate networks with relative ea … Read more Published Date: Aug 11, 2025 (1 hour, 31 minutes ago) Vulnerabilities has been mentioned in this article. […]
CVE-2025-8841 – Zlt2000 Microservices-Platform Unrestricted File Upload Vulnerability
The following table lists the changes that have been made to the CVE-2025-8841 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]
CVE-2025-8840 – jshERP Unauthenticated Remote Code Execution
The following table lists the changes that have been made to the CVE-2025-8840 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]
WinRAR zero day exploited by RomCom hackers in targeted attacks
WinRAR zero day exploited by RomCom hackers in targeted attacks ESET researchers have discovered a previously unknown vulnerability in WinRAR, exploited in the wild by Russia-aligned group RomCom. If you use WinRAR or related components such as the Windows version … Read more Published Date: Aug 11, 2025 (2 hours, 19 minutes ago) Vulnerabilities has been mentioned […]
Over 29,000 Exchange servers unpatched against high-severity flaw
Over 29,000 Exchange servers unpatched against high-severity flaw Over 29,000 Exchange servers exposed online remain unpatched against a high-severity vulnerability that can let attackers move laterally in Microsoft cloud environments, potentially leading to complet … Read more Published Date: Aug 11, 2025 (33 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-53786
CVE-2025-8853 – 2100 Technology Official Document Management System Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-8853 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]
CVE-2025-8839 – jshERP Remote Authorization Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-8839 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]
CVE-2025-8838 – WinterChenS my-site PreHandle Uri Improper Authentication Remote Vulnerability
The following table lists the changes that have been made to the CVE-2025-8838 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]
Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks
Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks An urgent security update has been released for Xerox FreeFlow Core software, addressing two critical vulnerabilities that could allow attackers to execute remote code and perform server-side request … Read more Published Date: Aug 11, 2025 (2 hours, 57 minutes ago) Vulnerabilities has been mentioned in this article. […]
CVE-2025-8837 – JasPer JPEG2000 File Handler Use After Free Vulnerability
The following table lists the changes that have been made to the CVE-2025-8837 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]