CVE-2025-48927

creation_timestamp| type| source ---|---|--- 2025-05-28 18:14:10+00:00| seen| https://infosec.exchange/users/cR0w/statuses/114586815688198231 2025-05-28 19:40:21+00:00| seen|...Read More ...

Continue Reading
CVE-2025-32801

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the contro ...

Continue Reading
CVE-2025-32801

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the contro ...

Continue Reading
CVE-2025-32802

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured ...

Continue Reading
CVE-2025-47748

creation_timestamp| type| source ---|---|--- 2025-05-28 17:32:12+00:00| seen|...Read More ...

Continue Reading
CVE-2025-32803

creation_timestamp| type| source ---|---|--- 2025-05-28 16:54:01+00:00| seen| https://bsky.app/profile/infosec.skyfleet.blue/post/3lqao5l566x2j 2025-05-28 17:21:12+00:00| seen| https://bsky.app/profil ...

Continue Reading
CVE-2025-32802

creation_timestamp| type| source ---|---|--- 2025-05-28 16:54:00+00:00| seen| https://bsky.app/profile/infosec.skyfleet.blue/post/3lqao5l566x2j 2025-05-28 17:20:57+00:00| seen| https://bsky.app/profil ...

Continue Reading
CVE-2025-32801

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the contro ...

Continue Reading

Back to Main

Subscribe for the latest news: