CVE-2025-31501

creation_timestamp| type| source ---|---|--- 2025-05-28 18:24:37+00:00| seen|...Read More ...

Continue Reading
CVE-2024-57337

creation_timestamp| type| source ---|---|--- 2025-05-28 18:24:24+00:00| seen|...Read More ...

Continue Reading
CVE-2025-48926

creation_timestamp| type| source ---|---|--- 2025-05-28 18:40:13+00:00| seen|...Read More ...

Continue Reading
CVE-2025-48926

creation_timestamp| type| source ---|---|--- 2025-05-28 18:40:13+00:00| seen|...Read More ...

Continue Reading
CVE-2024-57336

creation_timestamp| type| source ---|---|--- 2025-05-28 18:24:25+00:00| seen|...Read More ...

Continue Reading
CVE-2024-57338

creation_timestamp| type| source ---|---|--- 2025-05-28 18:24:35+00:00| seen|...Read More ...

Continue Reading
CVE-2025-32801 Loading a malicious hook library can lead to local privilege escalation

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the contro ...

Continue Reading
CVE-2025-32802 Insecure handling of file paths allows multiple local attacks

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured ...

Continue Reading

Back to Main

Subscribe for the latest news: