Monday, March 31, 2025
Tag:

Vulnerability

Exim Use-After-Free Vulnerability Enables Privilege Escalation

A significant security threat has been uncovered in Exim, a popular open-source mail transfer agent (MTA) widely used in Linux distributions.Identified as CVE-2025-30232, this...

Splunk RCE Vulnerability Enables Remote Code Execution via File Upload

A severe vulnerability in Splunk Enterprise and Splunk Cloud Platform has been identified, allowing for Remote Code Execution (RCE) via file uploads.This exploit can...

CrushFTP Warns of HTTP(S) Port Vulnerability Enabling Unauthorized Access

Both CrushFTP, a popular file transfer technology, and Next.js, a widely used React framework for building web applications, have come under scrutiny due to...

New Chrome Installer Fails on Windows 10 & 11 With “This app can’t run on your PC” Error

A recent snag in Google's Chrome distribution process has left Windows users unable to install the browser on their Intel and AMD systems.The issue,...

Clevo Devices Vulnerable as Boot Guard Private Key Leaks via Firmware Updates

A recent investigation has revealed that several Clevo-based devices are vulnerable due to a leak of Boot Guard private keys.This vulnerability was first reported...

DrayTek Router Vulnerability Exploited in the Wild – Linked to Reboot Loop Issue

The cybersecurity world has been abuzz with reports of widespread reboots affecting DrayTek routers across the globe.While the exact cause of these reboots remains...

Appsmith Developer Tool Vulnerability Exposes Systems to Remote Code Execution

A recent analysis by Rhino Security Labs has uncovered a series of critical vulnerabilities in the Appsmith developer tool, a platform used for building...

Google Chrome Zero-Day Vulnerability Actively Exploited in the Wild

Google has released an urgent update for its Chrome browser to patch a zero-day vulnerability known as CVE-2025-2783.This vulnerability has been actively exploited in...