CVE-2025-2827 – IBM Sterling File Gateway Information Disclosure

The following table lists the changes that have been made to the CVE-2025-2827 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-2793 – IBM Sterling B2B Integrator Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-2793 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-36600 – Dell Client Platform BIOS Local Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-36600 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CitrixBleed 2 exploitation started mid-June — how to spot it

CitrixBleed 2 exploitation started mid-June — how to spot it CitrixBleed 2 — CVE-2025–5777 — has been under active exploitation to hijack Netscaler sessions, bypassing MFA, globally for a month.I wrote this about the vulnerability back on June 24th, encouraging … Read more Published Date: Jul 08, 2025 (3 hours, 27 minutes ago) Vulnerabilities has been mentioned in this […]

CVE-2025-7181 – “Unrestricted File Upload Vulnerability in Staff Audit System”

The following table lists the changes that have been made to the CVE-2025-7181 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-7345 – Adobe Gdk Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-7345 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-7180 – Apache Code-projects Staff Audit System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-7180 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-47422 – Advanced Installer Local Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-47422 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-7179 – Code-Projects Library System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-7179 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-7178 – “Code-projects Food Distributor Site SQL Injection Vulnerability”

The following table lists the changes that have been made to the CVE-2025-7178 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]