Max severity Cisco ISE bug allows pre-auth command execution, patch now
Max severity Cisco ISE bug allows pre-auth command execution, patch now A critical vulnerability (CVE-2025-20337) in Cisco’s Identity Services Engine (ISE) could be exploited to let an unauthenticated attacker store malicious files, execute arbitrary code, or gain root pr … Read more Published Date: Jul 17, 2025 (2 hours, 49 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-20337 […]
NVIDIA Container Toolkit Vulnerabilities
NVIDIA Container Toolkit Vulnerabilities July 17, 2025Executive SummaryIn July 2025, NVIDIA disclosed two serious vulnerabilities impacting its Container Toolkit and GPU Operator components. These issues affect systems running GPU workloads … Read more Published Date: Jul 17, 2025 (53 minutes ago) Vulnerabilities has been mentioned in this article.
CVE-2025-54066 – DiracX-Web Redirect Hijacking Vulnerability
DiracX-Web is a web application that provides an interface to interact with the DiracX services. Prior to version 0.1.0-a8, an attacker can forge a request that they can pass to redirect an authenticated user to another arbitrary website. In the login page, DiracX-Web has a `redirect` field which is the location where the server will […]
CVE-2025-54064 – Rucio Apache Access Log Credentials Exposure
Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies. The common Rucio helm-charts for the `rucio-server`, `rucio-ui`, and `rucio-webui` define the log format for the apache access log of these components. The `X-Rucio-Auth-Token`, which is part of each request header sent to Rucio, […]
CVE-2025-54062 – WeGIA SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-54062 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-54061 – WeGIA SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-54061 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-54060 – WeGIA SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-54060 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-54058 – WeGIA SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-54058 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-47189 – Netwrix Directory Manager Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-47189 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-51630 – TOTOLINK N350RT Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-51630 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]