CVE-2025-30743 – Oracle Lease and Finance Management HTTP Internal Operations Unauthorized Access and Data Manipulation

The following table lists the changes that have been made to the CVE-2025-30743 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 15, 2025 Action […]

CVE-2025-41238 – VMware ESXi, Workstation, and Fusion PVSCSI Heap-Overflow Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-41238 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 15, 2025 Action […]

CVE-2025-41237 – VMware ESXi, Workstation, and Fusion VMCI Integer Underflow Privilege Escalation Vulnerability

VMware ESXi, Workstation, and Fusion contain an integer-underflow in VMCI (Virtual Machine Communication Interface) that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine’s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox […]

CVE-2025-41236 – VMware ESXi, Workstation, and Fusion VMXNET3 Integer Overflow Remote Code Execution

The following table lists the changes that have been made to the CVE-2025-41236 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 15, 2025 Action […]

Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack

Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack A newly disclosed flaw in Apache Tomcat’s Coyote engine—tracked as CVE-2025-53506—has surfaced in the latest round of HTTP/2 security advisories. First noted in the National Vulnerability Database fiv … Read more Published Date: Jul 15, 2025 (3 hours, 22 minutes ago) Vulnerabilities has been mentioned in this article. […]

CVE-2025-7657 – Google Chrome WebRTC Use-After-Free Vulnerability

The following table lists the changes that have been made to the CVE-2025-7657 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Jul. 15, 2025 Action Type […]

CVE-2025-7656 – Google Chrome V8 Integer Overflow Heap Corruption

The following table lists the changes that have been made to the CVE-2025-7656 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Jul. 15, 2025 Action Type […]

CVE-2025-6558 – Google Chrome ANGLE GPU Sandbox Escape Vulnerability

The following table lists the changes that have been made to the CVE-2025-6558 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Jul. 15, 2025 Action Type […]

CVE-2025-53893 – Apache File Browser Denial of Service Vulnerability

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.38.0, a Denial of Service (DoS) vulnerability exists in the file processing logic when reading a file on endpoint `Filebrowser-Server-IP:PORT/files/{file-name}` . While the server correctly handles and stores uploaded […]

CVE-2025-53826 – Apache File Browser JWT Token Authentication Bypass

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.39.0, File Browser’s authentication system issues long-lived JWT tokens that remain valid even after the user logs out. As of time of publication, no known patches exist.