CVE-2025-27625 – Jenkins URL Redirects Allow-Path Vulnerability
The following table lists the changes that have been made to the CVE-2025-27625 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]
CVE-2025-27624 – Jenkins CSRF Vulnerability
The following table lists the changes that have been made to the CVE-2025-27624 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]
CVE-2025-27623 – Jenkins Unencrypted Secret Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2025-27623 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]
CVE-2025-27622 – Jenkins Unencrypted Secret Exposure
The following table lists the changes that have been made to the CVE-2025-27622 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]
CVE-2025-27508 – Emissary Weak Cryptographic Hashing Algorithms
Emissary is a P2P based data-driven workflow engine. The ChecksumCalculator class within allows for hashing and checksum generation, but it includes or defaults to algorithms that are no longer recommended for secure cryptographic use cases (e.g., SHA-1, CRC32, and SSDEEP). These algorithms, while possibly valid for certain non-security-critical tasks, can expose users to security risks […]
China’s Silk Typhoon APT Shifts to IT Supply Chain Attacks
China’s Silk Typhoon APT Shifts to IT Supply Chain Attacks Source: Chebakalex7 via ShutterstockThe China-backed cyber-espionage group known as “Silk Typhoon” has begun targeting organizations in the IT supply chain to gain access to their downstream customers … Read more Published Date: Mar 05, 2025 (5 hours, 7 minutes ago) Vulnerabilities has been mentioned in this article. […]
CVE-2025-27516 – Jinja Template Code Execution Vulnerability
Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the […]
CVE-2025-25634 – Tenda AC15 Stack-Based Buffer Overflow
The following table lists the changes that have been made to the CVE-2025-25634 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]
CVE-2025-25632 – Tenda AC15 Remote Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-25632 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]
CVE-2025-25362 – Spacy-LLM SSTI Code Execution
The following table lists the changes that have been made to the CVE-2025-25362 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]