-
CVE-2025-0674 – Elber Password Management Authentication Bypass
CVE ID : CVE-2025-0674 Published : Feb. 7, 2025, 12:15 a.m. | 3 hours, 50 minutes ago Description : Multiple Elber products are affected by an authentication bypass vulnerability which allows unauthorized access to the password management functionality. Attackers can exploit this issue by manipulating the endpoint to overwrite any user’s password within the system. This grants…
-
CVE-2025-21408 – Microsoft Edge Chromium-based RCE
CVE ID : CVE-2025-21408 Published : Feb. 6, 2025, 11:15 p.m. | 4 hours, 50 minutes ago Description : Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability Severity: 8.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more… Go to Source
-
CVE-2025-21342 – Microsoft Edge Chromium RCE
CVE ID : CVE-2025-21342 Published : Feb. 6, 2025, 11:15 p.m. | 4 hours, 50 minutes ago Description : Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability Severity: 8.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more… Go to Source
-
CVE-2024-47258 – 2N Access Commander TLS Certificate Verification Weakness
CVE ID : CVE-2024-47258 Published : Feb. 6, 2025, 8:15 p.m. | 7 hours, 50 minutes ago Description : 2N Access Commander version 2.1 and prior is vulnerable in default settings to Man In The Middle attack due to not verifying certificates of 2N edge devices. Severity: 8.1 | HIGH Visit the link for more details, such…
-
CVE-2025-21177 – Microsoft Dynamics 365 Sales SSRF
CVE ID : CVE-2025-21177 Published : Feb. 6, 2025, 11:15 p.m. | 4 hours, 50 minutes ago Description : Server-Side Request Forgery (SSRF) in Microsoft Dynamics 365 Sales allows an authorized attacker to elevate privileges over a network. Severity: 8.7 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more……
-
CISA KEV Catalog Update Part III- February 2025
CISA KEV Catalog Update Part III- February 2025 The Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulnerabilities (KEV) Catalog, adding five new vulnerabilities that are actively being exploited in … Read more Published Date: Feb 07, 2025 (3 hours, 5 minutes ago) Vulnerabilities has been mentioned in this article. Go to Source
-
Kali Linux On The New Modern WSL
Late last year we had the pleasure of being reached out to by Microsoft in regards to participating in the launch of the new, modern, WSL distribution architecture. In summary, this new architecture allows for easier distribution and installation of WSL distros. For the full explanation of how this works, please view Microsoft’s blog post…
-
Kali Linux 2024.4 Release (Python 3.12, Goodbye i386, Raspberry Pi Imager & Kali NetHunter)
Just before the year starts to wrap up, we are getting the final 2024 release out! This contains a wide range of updates and changes, which are in already in effect, ready for immediate download, or updating. The summary of the changelog since the 2024.3 release from September is: Python 3.12 – New default Python…
-
Contributing to Kali
With the launch of our brand-new forums, we thought we would update our documentation and explore how everyone can contribute to the growth of Kali Linux. Kali is a multi-platform project that thrives on the the contributions of its community. Whether you’re curious about how you can pitch in or simply want to learn more…
-
The end of the i386 kernel and images
The i386 architecture has long been obsolete, and from this week, support for i386 in Kali Linux is going to shrink significantly: i386 kernel and images are going away. Images and releases will no longer be created for this platform. Some terminology first Let’s start with the terms used in Kali Linux to talk about…