NVIDIA NeMo AI Curator Enables Code Execution and Privilege Escalation
NVIDIA NeMo AI Curator Enables Code Execution and Privilege Escalation NVIDIA has issued a critical security bulletin addressing a high-severity vulnerability in its NeMo Curator platform that could allow attackers to execute malicious code and escalate privileges on aff … Read more Published Date: Aug 27, 2025 (2 hours, 5 minutes ago) Vulnerabilities has been mentioned in […]
CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits
CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits CISA released three significant Industrial Control Systems (ICS) advisories on August 26, 2025, alerting organizations to critical vulnerabilities affecting widely-deployed automation systems. These a … Read more Published Date: Aug 27, 2025 (18 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-41452 CVE-2025-41451 CVE-2025-6625 CVE-2025-7231 CVE-2025-7223 […]
Over 28,000 Citrix devices vulnerable to new exploited RCE flaw
Over 28,000 Citrix devices vulnerable to new exploited RCE flaw More than 28,200 Citrix instances are vulnerable to a critical remote code execution vulnerability tracked as CVE-2025-7775 that is already being exploited in the wild. The vulnerability affects NetSc … Read more Published Date: Aug 27, 2025 (2 hours, 25 minutes ago) Vulnerabilities has been mentioned in this […]
Analysis of Apple’s ImageIO Zero-Day Vulnerability: Attacker Context and Historical iOS Zero-Click Similarities
Analysis of Apple’s ImageIO Zero-Day Vulnerability: Attacker Context and Historical iOS Zero-Click Similarities Apple has issued emergency security updates across its entire ecosystem to address CVE-2025-43300, a critical zero-day vulnerability in the ImageIO framework that has been actively exploited in sophis … Read more Published Date: Aug 27, 2025 (30 minutes ago) Vulnerabilities has been mentioned in this […]
CVE-2025-50984 – Diskover-Web Elasticsearch Boolean Blind SQL Injection
diskover-web v2.3.0 Community Edition is vulnerable to multiple boolean-based blind SQL injection flaws in its Elasticsearch configuration form. Unsanitized user input in POST parameters such as ES_PASS, ES_MAXSIZE, ES_TRANSLOGSIZE, ES_TIMEOUT, ES_USER, ES_HOST, ES_PORT, ES_SCROLLSIZE, ES_CHUNKSIZE and others can be crafted to inject arbitrary SQLite expressions wrapped in JSON functions. By exploiting these injection points, an […]
CVE-2025-54598 – eBay Bevy Event CSRF Vulnerability
The following table lists the changes that have been made to the CVE-2025-54598 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
CVE-2025-50983 – Readarr SQLite Database SQL Injection
The following table lists the changes that have been made to the CVE-2025-50983 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
CVE-2025-50978 – Gitblit Reflected Cross-Site Scripting (XSS) Vulnerability
The following table lists the changes that have been made to the CVE-2025-50978 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
CVE-2025-9533 – TOTOLINK T10 Remote Authentication Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-9533 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Aug. 27, 2025 Action Type […]
CVE-2025-53105 – GLPI Unauthenticated Rule Reordering Vulnerability
GLPI, which stands for Gestionnaire Libre de Parc Informatique, is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 10.0.0 to before 10.0.19, a connected user without administration rights can change the rules execution order. This issue has been patched in version 10.0.19.