CVE-2025-54317 – Logpoint Path Traversal Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-54317 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 20, 2025 Action […]
CVE-2025-47917 – Mbed TLS Use-After-Free Vulnerability
Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. The documentation does not suggest that the function will free that pointer; however, the function does call mbedtls_asn1_free_named_data_list() on that argument, […]
CVE-2025-48965 – Mbed TLS NULL Pointer Dereference Vulnerability
The following table lists the changes that have been made to the CVE-2025-48965 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 20, 2025 Action […]
CVE-2025-7904 – iSourcecode Insurance Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-7904 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 20, 2025 Action […]
CVE-2025-7903 – Yangzongzhuan RuoYi Image Source Handler UI Layer Restriction Vulnerability
The following table lists the changes that have been made to the CVE-2025-7903 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 20, 2025 Action […]
Weekly Cybersecurity Newsletter: Chrome 0-Day, VMware Flaws Patched, Fortiweb Hack, Teams Abuse, and More
Weekly Cybersecurity Newsletter: Chrome 0-Day, VMware Flaws Patched, Fortiweb Hack, Teams Abuse, and More It’s been a busy seven days for security alerts. Google is addressing another actively exploited zero-day in Chrome, and VMware has rolled out key patches for its own set of vulnerabilities. We’ll als … Read more Published Date: Jul 20, 2025 […]
CVE-2025-7902 – Yangzongzhuan RuoYi Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-7902 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 20, 2025 Action […]
CVE-2025-7901 – RuoYi Swagger UI Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-7901 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 20, 2025 Action […]
CVE-2025-7898 – “Codcanyon iDentSoft File Upload Vulnerability”
The following table lists the changes that have been made to the CVE-2025-7898 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 20, 2025 Action […]
EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware
EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware The financially motivated threat actor known as EncryptHub (aka LARVA-208 and Water Gamayun) has been attributed to a new campaign that’s targeting Web3 developers to infect them with information stea … Read more Published Date: Jul 20, 2025 (1 hour, 28 minutes ago) Vulnerabilities […]