Vulnerability News

Vulnerability Cyber Security News.

Vulnerability Archives – Cyber Security News World’s #1 Premier Cybersecurity and Hacking News Portal

  • Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data
    by Florence Nightingale on August 21, 2025 at 6:42 am

    A critical security vulnerability has been discovered in Apache Tika’s PDF parser module that could enable attackers to access sensitive data and trigger malicious requests to internal systems.  The flaw, designated as CVE-2025-54988, affects multiple versions of the widely used document parsing library and has been assigned a critical severity rating by security researchers. Key The post Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data appeared first on Cyber Security News.

  • Copilot Vulnerability Breaks Audit Logs and Access Files Secretly for Hackers
    by Guru Baran on August 20, 2025 at 9:57 am

    A significant security vulnerability has been discovered in Microsoft’s Copilot for M365 that allowed users, including potential malicious insiders, to access and interact with sensitive files without leaving any record in the official audit logs. After patching the flaw, Microsoft has reportedly decided against issuing a formal CVE or notifying its customers, leaving organizations unaware The post Copilot Vulnerability Breaks Audit Logs and Access Files Secretly for Hackers appeared first on Cyber Security News.

  • Hackers Exploiting Apache ActiveMQ Flaw to Infiltrate Cloud-Based Linux Systems
    by Florence Nightingale on August 20, 2025 at 8:57 am

    A sophisticated campaign uncovered where adversaries are exploiting CVE-2023-46604, a critical remote code execution vulnerability in Apache ActiveMQ, to compromise cloud-based Linux systems. In this case, attackers are patching the very vulnerability they exploited to maintain exclusive access and evade detection, demonstrating advanced operational security practices typically reserved for nation-state actors. Key Takeaways1. Attackers exploit The post Hackers Exploiting Apache ActiveMQ Flaw to Infiltrate Cloud-Based Linux Systems appeared first on Cyber Security News.

  • CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks
    by Florence Nightingale on August 19, 2025 at 6:43 am

    CISA has issued a critical warning regarding a high-severity OS command injection vulnerability in Trend Micro Apex One Management Console that threat actors are actively exploiting in the wild.  The vulnerability, tracked as CVE-2025-54948 and classified under CWE-78, poses significant risks to organizations running on-premise installations of the enterprise security platform. Key Takeaways1. CISA confirms The post CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks appeared first on Cyber Security News.

  • Linux Kernel Netfilter Vulnerability Let Attackers Escalate Privileges
    by Florence Nightingale on August 18, 2025 at 1:39 pm

    A critical vulnerability in the Linux kernel’s netfilter ipset subsystem has been discovered that allows local attackers to escalate privileges to root-level access.  The flaw, identified in the bitmap:ip implementation within the ipset framework, stems from insufficient range validation when processing CIDR notation in IP address ranges.  This missing bounds check enables attackers to trigger The post Linux Kernel Netfilter Vulnerability Let Attackers Escalate Privileges appeared first on Cyber Security News.

  • What is Use-After-Free Vulnerability? – Impact and Mitigation
    by Mayura Kathir on August 18, 2025 at 10:42 am

    Use-after-free (UAF) vulnerabilities represent one of the most critical and prevalent security threats in modern software systems, particularly affecting applications written in memory-unsafe languages like C and C++. These vulnerabilities occur when a program continues to use a memory location after it has been freed, creating opportunities for attackers to manipulate program execution flow, corrupt The post What is Use-After-Free Vulnerability? – Impact and Mitigation appeared first on Cyber Security News.

  • Critical PostgreSQL Vulnerabilities Allow Arbitrary Code Injection During Restoration
    by Florence Nightingale on August 18, 2025 at 10:23 am

    The PostgreSQL Global Development Group has issued emergency security updates across all supported versions to address three critical vulnerabilities that could allow attackers to execute arbitrary code during database restoration processes.  The vulnerabilities affect PostgreSQL versions 13 through 17, with patches released in versions 17.6, 16.10, 15.14, 14.19, and 13.22. Among the three security flaws, The post Critical PostgreSQL Vulnerabilities Allow Arbitrary Code Injection During Restoration appeared first on Cyber Security News.

  • Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code
    by Guru Baran on August 16, 2025 at 3:34 pm

    A critical vulnerability in the Microsoft Web Deploy tool could allow authenticated attackers to execute remote code on affected systems.  The vulnerability, tracked as CVE-2025-53772, was disclosed on August 12, 2025, and carries a CVSS score of 8.8, indicating high severity. The flaw stems from the deserialization of untrusted data in Web Deploy, classified under The post Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code appeared first on Cyber Security News.

  • Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code – PoC Released
    by Florence Nightingale on August 14, 2025 at 11:18 am

    Critical vulnerabilities in Xerox FreeFlow Core, a widely-used print orchestration platform, allow unauthenticated remote attackers to execute malicious code on vulnerable systems.  The flaws, tracked as CVE-2025-8355 and CVE-2025-8356, affect the JMF Client service and have been patched in FreeFlow Core version 8.0.5.  Key Takeaways1. Two critical vulnerabilities in Xerox FreeFlow Core allow remote code The post Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code – PoC Released appeared first on Cyber Security News.

  • CISA Warns of N-able N-Central Deserialization and Injection Vulnerability Exploited in Attacks
    by Florence Nightingale on August 14, 2025 at 8:31 am

    CISA has issued urgent warnings regarding two critical security vulnerabilities in N-able N-Central remote monitoring and management (RMM) software that threat actors are actively exploiting.  The vulnerabilities, identified as CVE-2025-8875 and CVE-2025-8876, pose significant risks to organizations using this widely-deployed IT management platform. Key Takeaways1. Two critical N-able N-Central vulnerabilities were actively exploited for remote The post CISA Warns of N-able N-Central Deserialization and Injection Vulnerability Exploited in Attacks appeared first on Cyber Security News.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.