In an interesting turn of events, Linus Torvalds and Bill Gates meet each other for the first time at a…
Quest Patches Critical KACE SMA Flaws, Including CVSS 10 Authentication Bypass
Quest Software has released urgent security hotfixes addressing four newly discovered vulnerabilities in its KACE Systems Management Appliance (SMA) product line, one of which has been rated with the …
Read more
Published Date:
Jun 26, 2025 (2 hours, 57 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-32978
CVE-2025-32977
CVE-2025-32976
CVE-2025-32975
CISA Warns of Critical Flaws in ControlID iDSecure Vehicle Control Software
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a risk advisory on three newly discovered vulnerabilities affecting ControlID iDSecure On-premises, a vehicle access control soft …
Read more
Published Date:
Jun 26, 2025 (2 hours, 45 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-49853
CVE-2025-49852
CVE-2025-49851
CVE-2024-23917
CVE-2025-36004: IBM i Vulnerability Allows Privilege Escalation
IBM has issued a security advisory addressing a high-severity vulnerability in IBM i, its integrated operating system for Power Systems, which could allow a user to gain elevated privileges by exploit …
Read more
Published Date:
Jun 26, 2025 (2 hours, 36 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-36004
CVE-2025-33108
Printer Security Alert: Rapid7 Uncovers Critical Flaws (CVSS 9.8) in Multi Brother Models
In a major coordinated disclosure, Rapid7 has unveiled a disturbing set of vulnerabilities affecting a wide range of multifunction printers (MFPs) across four major vendors—Brother, FUJIFILM Business …
Read more
Published Date:
Jun 26, 2025 (2 hours, 28 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2024-51984
CVE-2024-51983
CVE-2024-51982
CVE-2024-51981
CVE-2024-51980
CVE-2024-51979
CVE-2024-51978
CVE-2024-51977
CISA Alerts on Critical Vulnerabilities in MICROSENS NMP Web+: Attackers Could Gain Full System Access
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a security advisory warning users of multiple high-impact vulnerabilities discovered in MICROSENS NMP Web+, a widely used network …
Read more
Published Date:
Jun 26, 2025 (2 hours, 22 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-49153
CVE-2025-49152
CVE-2025-49151
CVE-2023-48238
CVE-2023-37266
CVE-2025-49144 Privilege Escalation via Notepad++ Installer
Skip to content🛑 OverviewCVE-2025-49144 is a high-severity local privilege escalation vulnerability identified in Notepad++ versions 8.8.1 and earlier. The flaw stems from an insecure executable loadi …
Read more
Published Date:
Jun 26, 2025 (1 hour, 29 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-49144
CISA Catalog Update-June 25, 2025
Skip to content🔍 Executive SummaryThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent update to its Known Exploited Vulnerabilities (KEV) Catalog, highlighting three …
Read more
Published Date:
Jun 26, 2025 (50 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-49144
CVE-2024-54085
CVE-2024-0769
CVE-2019-6693
Firefox 140 Released With Fix for Code Execution Vulnerability – Update Now
Mozilla has released Firefox 140, addressing multiple critical security vulnerabilities, including a high-impact use-after-free vulnerability that could lead to code execution.
The update patches twel …
Read more
Published Date:
Jun 26, 2025 (29 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-6436
CVE-2025-6431
CVE-2025-6430
CVE-2025-6428
CVE-2025-6427
CVE-2025-6426
CVE-2025-6425
CVE-2025-6424
CVE ID : CVE-2025-6641
Published : June 25, 2025, 10:15 p.m. | 4 hours, 6 minutes ago
Description : PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26528.
Severity: 3.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-6642
Published : June 25, 2025, 10:15 p.m. | 4 hours, 6 minutes ago
Description : PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26530.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-6643
Published : June 25, 2025, 10:15 p.m. | 4 hours, 6 minutes ago
Description : PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26532.
Severity: 3.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-6644
Published : June 25, 2025, 10:15 p.m. | 4 hours, 6 minutes ago
Description : PDF-XChange Editor U3D File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26536.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-6645
Published : June 25, 2025, 10:15 p.m. | 4 hours, 6 minutes ago
Description : PDF-XChange Editor U3D File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26642.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-6646
Published : June 25, 2025, 10:15 p.m. | 4 hours, 6 minutes ago
Description : PDF-XChange Editor U3D File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26643.
Severity: 3.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-6648
Published : June 25, 2025, 10:15 p.m. | 4 hours, 6 minutes ago
Description : PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26671.
Severity: 3.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-6653
Published : June 25, 2025, 10:15 p.m. | 4 hours, 6 minutes ago
Description : PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26726.
Severity: 3.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-6649
Published : June 25, 2025, 10:15 p.m. | 4 hours, 6 minutes ago
Description : PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26709.
Severity: 3.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-6650
Published : June 25, 2025, 10:15 p.m. | 4 hours, 6 minutes ago
Description : PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26712.
Severity: 3.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-6651
Published : June 25, 2025, 10:15 p.m. | 4 hours, 6 minutes ago
Description : PDF-XChange Editor JP2 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26713.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more…