CVE-2025-53891 – Apache Time-Line File Upload Vulnerability (Remote File Inclusion/DoS)
The following table lists the changes that have been made to the CVE-2025-53891 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 15, 2025 Action […]
CVE-2025-53890 – Pyload CAPTCHA JavaScript Evaluation Remote Code Execution
The following table lists the changes that have been made to the CVE-2025-53890 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 15, 2025 Action […]
CVE-2025-53889 – Directus Unauthenticated Flow Trigger Vulnerability
The following table lists the changes that have been made to the CVE-2025-53889 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 15, 2025 Action […]
CVE-2025-53887 – Directus OpenAPI Spec Version Disclosure
The following table lists the changes that have been made to the CVE-2025-53887 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 15, 2025 Action […]
CVE-2025-53886 – Directus Session Hijacking Vulnerability
The following table lists the changes that have been made to the CVE-2025-53886 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 15, 2025 Action […]
CVE-2025-53885 – Directus Console Log Data Exposure Vulnerability
The following table lists the changes that have been made to the CVE-2025-53885 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 15, 2025 Action […]
CVE-2025-53839 – DRACOON Branding Service Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-53839 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 15, 2025 Action […]
CVE-2025-53836 – XWiki Rendering Macro Execution Bypass
XWiki Rendering is a generic rendering system that converts textual input in a given syntax (wiki syntax, HTML, etc) into another syntax (XHTML, etc). Starting in version 4.2-milestone-1 and prior to versions 13.10.11, 14.4.7, and 14.10, the default macro content parser doesn’t preserve the restricted attribute of the transformation context when executing nested macros. This […]
HazyBeacon: Novel Backdoor Uses AWS Lambda for Stealthy C2, Targets Govts
HazyBeacon: Novel Backdoor Uses AWS Lambda for Stealthy C2, Targets Govts Researchers from Unit 42 at Palo Alto Networks have uncovered a novel backdoor—HazyBeacon—used by a threat cluster identified as CL-STA-1020. The campaign, which began in late 2024, has targeted gover … Read more Published Date: Jul 15, 2025 (7 hours, 46 minutes ago) Vulnerabilities has been […]
CVE-2025-43856: OAuth2 Account Hijacking Flaw Found in Immich, a Popular Self-Hosted Photo Platform
CVE-2025-43856: OAuth2 Account Hijacking Flaw Found in Immich, a Popular Self-Hosted Photo Platform A critical vulnerability has been disclosed in Immich, a rapidly growing open-source project for self-hosted photo and video management, with over 70,000 stars on GitHub. Tracked as CVE-2025-43856 and … Read more Published Date: Jul 15, 2025 (7 hours, 56 minutes ago) Vulnerabilities has […]