New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers

New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers Key Takeaways1. ShinyHunters publicly released exploits for critical SAP vulnerabilities.2. Unauthenticated attackers can achieve complete system takeover and remote code execution.3. Immediately appl … Read more Published Date: Aug 19, 2025 (1 hour, 46 minutes ago) Vulnerabilities has been mentioned in this article. […]

CVE-2025-38989 affects Apache Tomcat

CVE-2025-38989 affects Apache Tomcat August 19, 2025CVE-2025-48989 is a Denial-of-Service (DoS) vulnerability in Apache Tomcat, specifically affecting its HTTP/2 implementation. It is classified as an “Improper Resource Shutdown or Relea … Read more Published Date: Aug 19, 2025 (1 hour, 53 minutes ago) Vulnerabilities has been mentioned in this article.

CVE-2025-9138 – Scada-LTS Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-9138 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 19, 2025 Action […]

CVE-2025-9139 – Scada-LTS Remote Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2025-9139 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 19, 2025 Action […]

CVE-2025-9137 – Scada-LTS Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-9137 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 19, 2025 Action […]

CVE-2025-43740 – Liferay Portal Stored Cross-Site Scripting Vulnerability

A Stored cross-site scripting vulnerability in the Liferay Portal 7.4.3.120 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.8, 2025.Q1.0 through 2025.Q1.15, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.1 through 2024.Q2.13 and 2024.Q1.9 through 2024.Q1.19 allows an remote authenticated attacker to inject JavaScript through the message boards feature available via the web interface.

Patching for persistence: How DripDropper Linux malware moves through the cloud

Patching for persistence: How DripDropper Linux malware moves through the cloud It may seem counterintuitive for an adversary to “fix” a compromised system after gaining remote access but in many scenarios the motivation can be twofold. It’s a great way to potentially lock out ot … Read more Published Date: Aug 19, 2025 (2 hours, 33 minutes […]

Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution

Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution Aug 19, 2025Ravie LakshmananVulnerability / Cyber Espionage A new exploit combining two critical, now-patched security flaws in SAP NetWeaver has emerged in the wild, putting organizations at risk o … Read more Published Date: Aug 19, 2025 (2 hours, 34 minutes ago) Vulnerabilities has […]

CVE-2025-9136 – RetroArch Out-of-Bounds Read Vulnerability

The following table lists the changes that have been made to the CVE-2025-9136 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 19, 2025 Action […]

Protecting your car against the PerfektBlue vulnerability in Bluetooth | Kaspersky official blog

Protecting your car against the PerfektBlue vulnerability in Bluetooth | Kaspersky official blog Cars these days are effectively computers on wheels — making them targets for cybercriminals: theft, unauthorized activation of on-board equipment, remote braking and steering, and spying on drivers a … Read more Published Date: Aug 19, 2025 (1 hour, 27 minutes ago) Vulnerabilities has […]