FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code

FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code A critical security vulnerability has been discovered in FortiWeb web application firewalls that enables unauthenticated attackers to execute unauthorized SQL commands through specially crafted HTTP a … Read more Published Date: Jul 09, 2025 (2 hours, 12 minutes ago) Vulnerabilities has been mentioned in this article.

Multiple Apache Tomcat Vulnerabilities Let Attackers Trigger DoS Attacks

Multiple Apache Tomcat Vulnerabilities Let Attackers Trigger DoS Attacks Apache Tomcat has addressed three critical denial-of-service (DoS) vulnerabilities that could allow malicious actors to disrupt web applications and services. These security flaws, tracked as CVE-2025 … Read more Published Date: Jul 09, 2025 (2 hours, 45 minutes ago) Vulnerabilities has been mentioned in this article.

New Android TapTrap Attack Let Malicious Apps Bypass Permission and Carry out Destructive Actions

New Android TapTrap Attack Let Malicious Apps Bypass Permission and Carry out Destructive Actions Security researchers discover novel animation-based vulnerability affecting 76% of Android apps. Security researchers at TU Wien have uncovered a sophisticated new attack vector dubbed “TapTrap” that … Read more Published Date: Jul 09, 2025 (2 hours, 58 minutes ago) Vulnerabilities has been mentioned […]

CVE-2025-7379 – DataSync Center Reverse Tabnabbing Security Bypass

The following table lists the changes that have been made to the CVE-2025-7379 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 09, 2025 Action […]

CVE-2025-3499 – Apache OS Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-3499 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by a6d3dc9e-0591-4a13-bce7-0f5b31ff6158 Jul. 09, 2025 Action […]

CVE-2025-3498 – Radiflow iSAP Smart Collector Unauthenticated Remote Command Execution and Configuration Modification

The following table lists the changes that have been made to the CVE-2025-3498 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by a6d3dc9e-0591-4a13-bce7-0f5b31ff6158 Jul. 09, 2025 Action […]

CVE-2025-3497 – Radiflow iSAP Smart Collector EOL Vulnerability

The following table lists the changes that have been made to the CVE-2025-3497 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by a6d3dc9e-0591-4a13-bce7-0f5b31ff6158 Jul. 09, 2025 Action […]

CVE-2025-27028 – Radiflow iSAP Smart Collector Linux Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-27028 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by a6d3dc9e-0591-4a13-bce7-0f5b31ff6158 Jul. 09, 2025 Action […]

CVE-2025-27027 – Radiflow iSAP Smart Collector Rbash Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-27027 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by a6d3dc9e-0591-4a13-bce7-0f5b31ff6158 Jul. 09, 2025 Action Type […]

Adobe adviseert kritieke ColdFusion-lekken binnen 72 uur te patchen

Adobe adviseert kritieke ColdFusion-lekken binnen 72 uur te patchen Adobe heeft updates uitgebracht voor kritieke kwetsbaarheden in ColdFusion en adviseert die binnen 72 uur te installeren. Het softwarebedrijf heeft het installeren van de patches de hoogste prioriteit … Read more Published Date: Jul 09, 2025 (3 hours, 56 minutes ago) Vulnerabilities has been mentioned in this article. […]