CVE-2025-31160 - Atop ≤2.11. DoS Vulnerability – How Unprivileged Local Users Can Crash the Monitoring Tool
Atop is a popular Linux system and process monitor tool. Many sysadmins rely on it for live performance stats. But a recent vulnerability—CVE-2025-31160—shows
CVE-2024-55963 - Appsmith Pre-1.51 Faulty Access Control Lets Regular Users Restart the Server
A serious oversight has been found in Appsmith, a popular open-source platform for building internal tools, before version 1.51. Due to weak access control
CVE-2025-2825 - CrushFTP S3 Authorization Header Authentication Bypass — Full Details, Code Example, and Exploit Insights
CrushFTP is a popular secure FTP solution used by organizations to transfer sensitive files. In March 2025, a critical vulnerability was discovered in how CrushFTP
CVE-2025-2783 - Unpacking the Chrome Mojo Sandbox Escape – What Happened, How Exploit Works, and Steps to Stay Safe
---
Introduction
On June 2024, Google announced a high-severity security vulnerability in Chrome for Windows, tracked as CVE-2025-2783. This post is your technical deep dive:
CVE-2025-30524 - SQL Injection in Origincode Product Catalog (≤1..4) – How Attackers Can Steal Your Data
In June 2025, a serious security vulnerability (CVE-2025-30524) was discovered in Origincode's Product Catalog plugin, versions up to and including 1..4. If
Episode
00:00:00
00:00:00