CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-24085 Apple...
Vous n'êtes pas connecté
Background CVE-2025-24085 is a critical zero-day vulnerability identified in Apple’s Core Media framework. This framework is integral to the media processing pipeline used by AVFoundation and other high-level media frameworks across Apple’s product ecosystem. This vulnerability enables malicious applications to potentially gain elevated privileges on affected devices, posing a significant security risk. Technical Details Description […]
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-24085 Apple...
Apple addressed the first zero-day vulnerability of 2025, which is actively exploited in attacks in the wild aimed at iPhone users. Apple released...
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple products’ flaw to its Known Exploited Vulnerabilities catalog. The U.S....
Background CVE-2025-22217 is a critical vulnerability identified in VMware’s Avi Load Balancer, which is an unauthenticated blind SQL injection...
Background CVE-2024-50050 is a significant security vulnerability identified in Meta’s Llama Stack, a popular framework for building and...
Background: CVE-2025-0107 is a critical OS command injection vulnerability discovered in Palo Alto Networks’ Expedition Tool, version 1.2.101...
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple products’ flaw to its Known Exploited Vulnerabilities catalog. The U.S....
Apple has released software updates to address several security flaws across its portfolio, including a zero-day vulnerability that it said has been...
CVE-2025-0314 is a high-severity cross-site scripting (XSS) vulnerability identified in GitLab, a widely used platform for version control, CI/CD, and...
Background CVE-2025-0065 is an unauthenticated privilege escalation vulnerability with a CVSS score of 7.8. This flaw is found in the...