CVE-2025-54317 – Logpoint Path Traversal Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-54317 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 20, 2025 Action […]

CVE-2025-47917 – Mbed TLS Use-After-Free Vulnerability

Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. The documentation does not suggest that the function will free that pointer; however, the function does call mbedtls_asn1_free_named_data_list() on that argument, […]

CVE-2025-48965 – Mbed TLS NULL Pointer Dereference Vulnerability

The following table lists the changes that have been made to the CVE-2025-48965 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 20, 2025 Action […]

CVE-2025-7904 – iSourcecode Insurance Management System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-7904 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 20, 2025 Action […]

CVE-2025-7903 – Yangzongzhuan RuoYi Image Source Handler UI Layer Restriction Vulnerability

The following table lists the changes that have been made to the CVE-2025-7903 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 20, 2025 Action […]

CVE-2025-7902 – Yangzongzhuan RuoYi Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-7902 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 20, 2025 Action […]

CVE-2025-7901 – RuoYi Swagger UI Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-7901 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 20, 2025 Action […]

CVE-2025-7898 – “Codcanyon iDentSoft File Upload Vulnerability”

The following table lists the changes that have been made to the CVE-2025-7898 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 20, 2025 Action […]

EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware

EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware The financially motivated threat actor known as EncryptHub (aka LARVA-208 and Water Gamayun) has been attributed to a new campaign that’s targeting Web3 developers to infect them with information stea … Read more Published Date: Jul 20, 2025 (1 hour, 28 minutes ago) Vulnerabilities […]