CVE Alert: CVE-2025-40780 – ISC – BIND 9
CVE-2025-40780 HIGHNo exploitation known In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is...
CVE-2025-40780 HIGHNo exploitation known In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is...
CVE-2025-61932 UnknownExploitation active Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) improperly verifies the origin of incoming...
CVE-2025-11086 HIGHNo exploitation known The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable...
CVE-2025-41724 HIGHNo exploitation known An unauthenticated remote attacker can crash the wscserver by sending incomplete SOAP requests. The wscserver process...
CVE-2025-41722 HIGHNo exploitation known The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated...
CVE-2025-41719 HIGHNo exploitation known A low privileged remote attacker can corrupt the webserver users storage on the device by setting...
CVE-2025-61756 HIGHNo exploitation known Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component:...
CVE-2025-61763 HIGHNo exploitation known Vulnerability in Oracle Essbase (component: Essbase Web Platform). The supported version that is affected is 21.7.3.0.0....
CVE-2025-61751 HIGHNo exploitation known Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component:...
CVE-2025-61752 HIGHNo exploitation known Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that...
CVE-2025-61760 HIGHNo exploitation known Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are...
CVE-2025-62290 HIGHNo exploitation known Vulnerability in the Oracle ZFS Storage Appliance Kit product of Oracle Systems (component: Block Storage). The...
CVE-2025-53049 HIGHNo exploitation known Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Web Administration)....
CVE-2025-53066 HIGHNo exploitation known Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of...
CVE-2025-53036 HIGHNo exploitation known Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component:...
CVE-2025-53050 HIGHNo exploitation known Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Performance Monitor). Supported versions that...
CVE-2025-53043 HIGHNo exploitation known Vulnerability in the Oracle Product Hub product of Oracle E-Business Suite (component: Item Catalog). Supported versions...
CVE-2025-11151 HIGHNo exploitation known Exposure of Sensitive Information to an Unauthorized Actor, Exposure of Sensitive System Information to an Unauthorized...
CVE-2025-11949 HIGHNo exploitation known EasyFlow .NET and EasyFlow AiNet, developed by Digiwin, has a Missing Authentication vulnerability, allowing unauthenticated remote...
CVE-2025-8078 HIGHNo exploitation known A post-authentication command injection vulnerability in Zyxel ATP series firmware versions from V4.32 through V5.40, USG...
CVE-2025-9133 HIGHNo exploitation known A missing authorization vulnerability in Zyxel ATP series firmware versions from V4.32 through V5.40, USG FLEX...
CVE-2025-41390 HIGHNo exploitation knownPoC observed An arbitrary code execution vulnerability exists in the git functionality of Truffle Security Co. TruffleHog...
CVE-2022-48503 UnknownCISA KEVExploitation active The issue was addressed with improved bounds checks. This issue is fixed in tvOS 15.6, watchOS...
CVE-2025-33073 HIGHCISA KEVExploitation active Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network....