Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: phpMyFAQ 3.1.7 - Reflected Cross-Site Scripting (XSS)
Source: ExploitDB
April 16th, 2025 (6 days ago)
Description: ibL – Ingenieurbüro für Landentwicklung GmbH – based in Halle (Saale) is a consulting and planning engineering firm that operates primarily in rural areas. Our work focuses on planning services for land development using geodata. In selected regions, we act as a suitable agency for determining and reorganizing the ownership of land and buildings based on Section 99 (2) of the Land Consolidation Act and Section 53 of the Agricultural Adjustment Act. ===> Phone Number: 0345 233 410 Revenue: $5 Million Industry: Engineering Employees: 25 Data: 56gb
Source: Ransomware.live
April 16th, 2025 (6 days ago)

CVE-2025-3698

Description: Interface exposure vulnerability in the mobile application (com.transsion.carlcare) may lead to information leakage risk.

EPSS Score: 0.03%

Source: CVE
April 16th, 2025 (6 days ago)
Description: MITRE’s CVE program has been an important pillar in cybersecurity for over two decades. The lack of certainty surrounding the future of the CVE program creates great uncertainty about how newly discovered vulnerabilities will be cataloged.BackgroundOn April 15, reports circulated that the contract for funding the Common Vulnerabilities and Exposures (CVE) program along with other related programs, such as Common Weakness Enumeration (CWE), would be expiring on April 16. The letter below was sent to CVE Board Members and published on social media and other fora announcing the expiration of these programs:The legitimacy of this letter and its contents was confirmed by cybersecurity journalist Brian Krebs in a post on Mastodon. Tenable has also independently confirmed the letter’s legitimacy.CVE program importanceWhile flawed in some ways, the CVE program, which recently celebrated its 25th anniversary, has been an important pillar in cybersecurity for over two decades. It provides a common taxonomy for cybersecurity solutions and organizations to track vulnerabilities and exposures. Since its launch in 1999, the CVE program has published over 250,000 CVEs as of the end of 2024.Risk to CVE programWith the report that the funding for the CVE program is potentially set to expire on April 16, the biggest concern stems from the fact that CVE Numbering Authorities, or CNAs, will no longer be able to reserve and assign CVEs for newly discovered vulnerabilities. While CNAs typically...
Source: Tenable Blog
April 16th, 2025 (6 days ago)
Source: TheRegister
April 16th, 2025 (6 days ago)
Description: The MITRE Corporation said on Tuesday that its stewardship of the CVE program may be ending this week because the federal government has decided not to renew its contract with the nonprofit.
Source: The Record
April 16th, 2025 (6 days ago)

CVE-2025-25458

Description: Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via serverName2.

EPSS Score: 0.03%

Source: CVE
April 15th, 2025 (6 days ago)

CVE-2025-25453

Description: Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via serviceName2.

EPSS Score: 0.03%

Source: CVE
April 15th, 2025 (6 days ago)

CVE-2025-22911

Description: RE11S v1.11 was discovered to contain a stack overflow via the rootAPmac parameter in the formiNICbasicREP function.

EPSS Score: 0.05%

Source: CVE
April 15th, 2025 (6 days ago)

CVE-2024-49200

Description: An issue was discovered in AcpiS3SaveDxe and ChipsetSvcDxe in Insyde InsydeH2O with kernel 5.2 though 5.7. A potential DXE memory corruption vulnerability has been identified. The root cause is use of a pointer originating from the value of an NVRAM variable as the target of a write operation. This can be leveraged by an attacker to perform arbitrary writes, potentially leading to arbitrary code execution. The issue has been fixed in kernel 5.2, Version 05.29.44; kernel 5.3, Version 05.38.44; kernel 5.4, Version 05.46.44; kernel 5.5, Version 05.54.44; kernel 5.6, Version 05.61.44; and kernel 5.7, Version 05.70.44.

EPSS Score: 0.03%

Source: CVE
April 15th, 2025 (6 days ago)