What is Use-After-Free Vulnerability? – Impact and Mitigation

What is Use-After-Free Vulnerability? – Impact and Mitigation Use-after-free (UAF) vulnerabilities represent one of the most critical and prevalent security threats in modern software systems, particularly affecting applications written in memory-unsafe language … Read more Published Date: Aug 18, 2025 (1 hour, 21 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2019-5786

Critical PostgreSQL Vulnerabilities Allow Arbitrary Code Injection During Restoration

Critical PostgreSQL Vulnerabilities Allow Arbitrary Code Injection During Restoration The PostgreSQL Global Development Group has issued emergency security updates across all supported versions to address three critical vulnerabilities that could allow attackers to execute arbitrary co … Read more Published Date: Aug 18, 2025 (1 hour, 40 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-8715 […]

CVE-2025-47206 – File Station Out-of-Bounds Write Vulnerability

The following table lists the changes that have been made to the CVE-2025-47206 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 18, 2025 Action […]

CVE-2025-41242 – Apache Tomcat and Eclipse Jetty Spring Framework MVC Path Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2025-41242 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 18, 2025 Action […]

Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824

Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824 In April 2025, Microsoft patched 121 vulnerabilities in its products. According to the company, only one of them was being used in real-world attacks at the time the patch was released: CVE-2025-29824 … Read more Published Date: Aug 18, 2025 (3 hours, 4 minutes ago) Vulnerabilities […]

CVE-2025-5296 – Apache Link Following Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-5296 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 18, 2025 Action […]

‘Honderden N-Central RMM-servers bevatten actief misbruikte kwetsbaarheden’

‘Honderden N-Central RMM-servers bevatten actief misbruikte kwetsbaarheden’ Op internet zijn bijna negenhonderd N-Central RMM-servers van leverancier N-Able te vinden, waarvan meer dan tachtig in Nederland, die twee actief misbruikte kwetsbaarheden bevatten. Dat laat The Shad … Read more Published Date: Aug 18, 2025 (4 hours, 5 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-8876 CVE-2025-8875

CVE-2025-6625 – Cisco FTP Denial Of Service

The following table lists the changes that have been made to the CVE-2025-6625 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 18, 2025 Action […]

CVE-2025-57703 – DIAEnergie Reflected Cross-site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-57703 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 759f5e80-c8e1-4224-bead-956d7b33c98b Aug. 18, 2025 Action […]

CVE-2025-57702 – DIAEnergie Reflected Cross-site Scripting

The following table lists the changes that have been made to the CVE-2025-57702 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 759f5e80-c8e1-4224-bead-956d7b33c98b Aug. 18, 2025 Action […]