CVE-2025-53811 – Mosh-Pro macOS RunAsNode Arbitrary Code Execution

The configuration of Mosh-Pro on macOS, specifically the “RunAsNode” fuse enabled, allows a local attacker with unprivileged access to execute arbitrary code that inherits Mosh-Pro TCC (Transparency, Consent, and Control) permissions.  Acquired resource access is limited to previously granted permissions by the user. Accessing other resources beyond previously granted TCC permissions will prompt the user for […]

CVE-2025-38676 – “AMD IOMMU Stack Buffer Overflow”

The following table lists the changes that have been made to the CVE-2025-38676 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Aug. 26, 2025 Action […]

Docker Desktop-lek geeft malafide containers toegang tot host-systeem

Docker Desktop-lek geeft malafide containers toegang tot host-systeem Een kritieke kwetsbaarheid in Docker Desktop maakt het mogelijk voor malafide containers om toegang tot het onderliggende host-systeem te krijgen. Het beveiligingslek (CVE-2025-9074) is vorige week me … Read more Published Date: Aug 26, 2025 (1 hour, 47 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-9074

CVE-2025-44002 – TeamViewer RCE

The following table lists the changes that have been made to the CVE-2025-44002 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]

CVE-2025-1501 – CMC Unauthenticated Access Control Bypass

The following table lists the changes that have been made to the CVE-2025-1501 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]

PoC Code Available for Critical SQLite Vulnerability (CVE-2025-6965)

PoC Code Available for Critical SQLite Vulnerability (CVE-2025-6965) Privacy & Transparencysecurityonline.info and our partners ask for your consent to use your personal data, and to store and/or access information on your device. This includes using your personal data … Read more Published Date: Aug 26, 2025 (10 hours, 59 minutes ago) Vulnerabilities has been mentioned in this […]

PoC Exploit Released for Chrome 0-Day Vulnerability Exploited in the Wild

PoC Exploit Released for Chrome 0-Day Vulnerability Exploited in the Wild Google has disclosed a critical zero-day vulnerability in the V8 JavaScript engine used by Chrome, tracked as CVE-2025-5419. Before a patch could be rolled out to all users, proof-of-concept (PoC) exp … Read more Published Date: Aug 26, 2025 (2 hours, 32 minutes ago) Vulnerabilities has […]

WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers – Detailed Case Study

WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers – Detailed Case Study The cybersecurity landscape has been significantly impacted by the discovery and active exploitation of two critical zero-day vulnerabilities in WinRAR, one of the world’s most widely used file compre … Read more Published Date: Aug 26, 2025 (1 hour ago) Vulnerabilities has been mentioned […]

Git vulnerability leading to RCE is being exploited by attackers (CVE-2025-48384)

Git vulnerability leading to RCE is being exploited by attackers (CVE-2025-48384) CVE-2025-48384, a recently patched vulnerability in the popular distributed revision control system Git, is being exploited by attackers. Details about the attacks are not public, but the confirmation … Read more Published Date: Aug 26, 2025 (1 hour, 7 minutes ago) Vulnerabilities has been mentioned in […]

CVE-2025-48108 – Mojoomla School Management Missing Authorization Vulnerability

The following table lists the changes that have been made to the CVE-2025-48108 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]