FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code
FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code A critical security vulnerability has been discovered in FortiWeb web application firewalls that enables unauthenticated attackers to execute unauthorized SQL commands through specially crafted HTTP a … Read more Published Date: Jul 09, 2025 (2 hours, 12 minutes ago) Vulnerabilities has been mentioned in this article.
Multiple Apache Tomcat Vulnerabilities Let Attackers Trigger DoS Attacks
Multiple Apache Tomcat Vulnerabilities Let Attackers Trigger DoS Attacks Apache Tomcat has addressed three critical denial-of-service (DoS) vulnerabilities that could allow malicious actors to disrupt web applications and services. These security flaws, tracked as CVE-2025 … Read more Published Date: Jul 09, 2025 (2 hours, 45 minutes ago) Vulnerabilities has been mentioned in this article.
New Android TapTrap Attack Let Malicious Apps Bypass Permission and Carry out Destructive Actions
New Android TapTrap Attack Let Malicious Apps Bypass Permission and Carry out Destructive Actions Security researchers discover novel animation-based vulnerability affecting 76% of Android apps. Security researchers at TU Wien have uncovered a sophisticated new attack vector dubbed “TapTrap” that … Read more Published Date: Jul 09, 2025 (2 hours, 58 minutes ago) Vulnerabilities has been mentioned […]
CVE-2025-7379 – DataSync Center Reverse Tabnabbing Security Bypass
The following table lists the changes that have been made to the CVE-2025-7379 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 09, 2025 Action […]
CVE-2025-3499 – Apache OS Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-3499 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by a6d3dc9e-0591-4a13-bce7-0f5b31ff6158 Jul. 09, 2025 Action […]
CVE-2025-3498 – Radiflow iSAP Smart Collector Unauthenticated Remote Command Execution and Configuration Modification
The following table lists the changes that have been made to the CVE-2025-3498 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by a6d3dc9e-0591-4a13-bce7-0f5b31ff6158 Jul. 09, 2025 Action […]
CVE-2025-3497 – Radiflow iSAP Smart Collector EOL Vulnerability
The following table lists the changes that have been made to the CVE-2025-3497 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by a6d3dc9e-0591-4a13-bce7-0f5b31ff6158 Jul. 09, 2025 Action […]
CVE-2025-27028 – Radiflow iSAP Smart Collector Linux Privilege Escalation
The following table lists the changes that have been made to the CVE-2025-27028 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by a6d3dc9e-0591-4a13-bce7-0f5b31ff6158 Jul. 09, 2025 Action […]
CVE-2025-27027 – Radiflow iSAP Smart Collector Rbash Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-27027 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by a6d3dc9e-0591-4a13-bce7-0f5b31ff6158 Jul. 09, 2025 Action Type […]
Adobe adviseert kritieke ColdFusion-lekken binnen 72 uur te patchen
Adobe adviseert kritieke ColdFusion-lekken binnen 72 uur te patchen Adobe heeft updates uitgebracht voor kritieke kwetsbaarheden in ColdFusion en adviseert die binnen 72 uur te installeren. Het softwarebedrijf heeft het installeren van de patches de hoogste prioriteit … Read more Published Date: Jul 09, 2025 (3 hours, 56 minutes ago) Vulnerabilities has been mentioned in this article. […]