CVE‑2025‑53605: Denial-of-Service in Rust protobuf Crate

CVE‑2025‑53605 is a medium-severity vulnerability in the widely used Rust protobuf crate (versions before 3.7.2). An attacker exploiting uncontrolled recursion in parsing unknown fields can trigger excessive resource use, leading to a Denial-of-Service (DoS) attack. Vulnerability Details < CVE ID CVE‑2025‑53605 Unique ID for tracking the protobuf crate vulnerability. Affected Software Rust protobuf crate Impacts […]
CVE‑2025‑52842: Reflected XSS in Laundry Application

CVE‑2025‑52842 is a medium-severity reflected Cross-Site Scripting (XSS) vulnerability in Laundry 2.3.0, a desktop application for Linux and macOS. By injecting malicious scripts into specific inputs, an attacker can execute code to hijack user sessions or take over accounts. Vulnerability Details Exploitation Path An attacker can craft a malicious URL or input field that, when […]
CVE‑2025‑36630: Local Privilege Escalation in Tenable Nessus on Windows

CVE‑2025‑36630 is a newly identified high-severity vulnerability affecting Tenable Nessus on Windows systems (versions prior to 10.8.5). The flaw allows non-administrative users to overwrite arbitrary system files with data from application logs running as SYSTEM, potentially enabling full privilege escalation. Vulnerability Details < CVE ID CVE‑2025‑36630 Unique ID to track this vulnerability. Affected Software Tenable […]
CVE‑2025‑3461: Unauthenticated Telnet Access in Quantenna Wi‑Fi Chipsets

CVE‑2025‑3461 is a newly assigned critical-severity vulnerability in Quantenna Wi‑Fi chipsets (used in various routers and embedded devices), where a telnet service is enabled by default with no authentication. This can allow remote attackers to gain root-level access and control raising serious security concerns. Vulnerability Details Exploitation Path These chipsets ship with telnet enabled by […]
CVE‑2024‑55585: Unauthenticated Admin API Access in moPS App

CVE‑2024‑55585 is a high to critical severity vulnerability affecting the moPS App through version 1.8.618. The flaw allows unauthenticated users to call administrative API endpoints such as “/api/v1/users/resetpassword” enabling unintended read/write operations on the app. Vulnerability Details Exploitation Path Due to missing authentication checks on administrative endpoints, unauthenticated or low‑privileged users can access and execute […]