==========================
== Gharib Personal Blog ==
==========================
A Techi Personal Blog

CVE-2025-2556 - Audi UTR Dashcam 20 Hard-Coded Credentials Vulnerability

CVE-2025-2556 - Audi UTR Dashcam 20 Hard-Coded Credentials Vulnerability

CVE ID : CVE-2025-2556 Published : March 20, 2025, 6:15 p.m. | 11 hours, 43 minutes ago Description : A vulnerability classified as problematic was found in Audi UTR Dashcam 2.0. Affected by this vulnerability is an unknown functionality of the component Video Stream Handler. The manipulation leads to hard-coded credentials. The attack

CVE ID : CVE-2025-2556
Published : March 20, 2025, 6:15 p.m. | 11 hours, 43 minutes ago
Description : A vulnerability classified as problematic was found in Audi UTR Dashcam 2.0. Affected by this vulnerability is an unknown functionality of the component Video Stream Handler. The manipulation leads to hard-coded credentials. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. Upgrading to version 2.89 and 2.90 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early about these issues and acted very professional. Version 2.89 is fixing this issue for new customers and 2.90 is going to fix it for existing customers.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more…

Read more...

CVE-2025-2553 - D-Link DIR-618 and DIR-605L Local File Inclusion Vulnerability

CVE-2025-2553 - D-Link DIR-618 and DIR-605L Local File Inclusion Vulnerability

CVE ID : CVE-2025-2553 Published : March 20, 2025, 6:15 p.m. | 11 hours, 43 minutes ago Description : A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02. It has been rated as problematic. This issue affects some unknown processing of the file /goform/formVirtualServ. The manipulation leads to improper access controls. The

CVE ID : CVE-2025-2553
Published : March 20, 2025, 6:15 p.m. | 11 hours, 43 minutes ago
Description : A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02. It has been rated as problematic. This issue affects some unknown processing of the file /goform/formVirtualServ. The manipulation leads to improper access controls. The attack needs to be approached within the local network. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more…

Read more...

CVE-2025-29922 - KCP Unauthenticated Object Creation and Deletion Vulnerability

CVE-2025-29922 - KCP Unauthenticated Object Creation and Deletion Vulnerability

CVE ID : CVE-2025-29922 Published : March 20, 2025, 6:15 p.m. | 1 day, 20 hours ago Description : kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kubernetes and container workloads. Prior to 0.26.3, the identified vulnerability allows creating or deleting an object via the APIExport VirtualWorkspace in any arbitrary

CVE ID : CVE-2025-29922
Published : March 20, 2025, 6:15 p.m. | 1 day, 20 hours ago
Description : kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kubernetes and container workloads. Prior to 0.26.3, the identified vulnerability allows creating or deleting an object via the APIExport VirtualWorkspace in any arbitrary target workspace for pre-existing resources. By design, this should only be allowed when the workspace owner decides to give access to an API provider by creating an APIBinding. With this vulnerability, it is possible for an attacker to create and delete objects even if none of these requirements are satisfied, i.e. even if there is no APIBinding in that workspace at all or the workspace owner has created an APIBinding, but rejected a permission claim. A fix for this issue has been identified and has been published with kcp 0.26.3 and 0.27.0.
Severity: 9.6 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more…

Read more...

CVE-2025-29923 - Redis Go Client Out-of-Order Response Vulnerability

CVE-2025-29923 - Redis Go Client Out-of-Order Response Vulnerability

Source

CVE-2025-29215 - Tenda AX12 Stack Overflow Vulnerability

CVE-2025-29215 - Tenda AX12 Stack Overflow Vulnerability

Source

CVE-2025-29914 - Coraza WAF REQUEST_FILENAME Bypass Vulnerability

CVE-2025-29914 - Coraza WAF REQUEST_FILENAME Bypass Vulnerability

Source

What does Googles 32B acquisition of cloud security startup Wiz mean for security operations

What does Googles 32B acquisition of cloud security startup Wiz mean for security operations

Cloud security is a rapidly accelerating challenge for security operations—a trend highlighted in our 2025 Threat Detection Report.

Cloud security is a rapidly accelerating challenge for security operations—a trend highlighted in our 2025 Threat Detection Report.

Source

CVE-2025-2551 - D-Link DIR-618 and DIR-605L Improper Access Control Vulnerability

CVE-2025-2551 - D-Link DIR-618 and DIR-605L Improper Access Control Vulnerability

Source

CVE-2025-2552 - D-Link DIR-618 and DIR-605L Local Network Access Control Vulnerability

CVE-2025-2552 - D-Link DIR-618 and DIR-605L Local Network Access Control Vulnerability

Source

CVE-2025-2565 - Liferay Portal and DXP Data Exposure Vulnerability

CVE-2025-2565 - Liferay Portal and DXP Data Exposure Vulnerability

Source

Previous Page 17 of 576 Next Page