CVE-2025-51862 – Insecure Direct Object Reference (IDOR) vulnerabil

The following table lists the changes that have been made to the CVE-2025-51862 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-51860 – Stored Cross-Site Scripting (XSS) in TelegAI (tele

Stored Cross-Site Scripting (XSS) in TelegAI (telegai.com) 2025-05-26 in its chat component and character container component. An attacker can achieve arbitrary client-side script execution by crafting an AI Character with SVG XSS payloads in either description, greeting, example dialog, or system prompt(instructing the LLM to embed XSS payload in its chat response). When a user […]

CVE-2025-51859 – Stored Cross-Site Scripting (XSS) vulnerability in

The following table lists the changes that have been made to the CVE-2025-51859 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-51858 – Self Cross-Site Scripting (XSS) vulnerability in C

The following table lists the changes that have been made to the CVE-2025-51858 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-4878 – A vulnerability was found in libssh, where an unin

The following table lists the changes that have been made to the CVE-2025-4878 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

Cisco waarschuwt voor actief misbruik van kritieke ISE-kwetsbaarheden

Cisco waarschuwt voor actief misbruik van kritieke ISE-kwetsbaarheden Aanvallers maken actief misbruik van kritieke kwetsbaarheden in Cisco Identity Services Engine (ISE) en Cisco ISE Passive Identity Connector (ISE-PIC) waardoor kwetsbare servers volledig op afstand zi … Read more Published Date: Jul 22, 2025 (4 hours, 8 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-20337 CVE-2025-20282 […]

Cisco: Maximum-severity ISE RCE flaws now exploited in attacks

Cisco: Maximum-severity ISE RCE flaws now exploited in attacks Cisco is warning that three recently patched critical remote code execution vulnerabilities in Cisco Identity Services Engine (ISE) are now being actively exploited in attacks. Although the vendor did … Read more Published Date: Jul 22, 2025 (4 hours, 32 minutes ago) Vulnerabilities has been mentioned in this article. […]

Apache Jena Vulnerability Leads to Arbitrary File Access or Manipulation

Apache Jena Vulnerability Leads to Arbitrary File Access or Manipulation Apache Jena has disclosed two significant security vulnerabilities affecting versions through 5.4.0, prompting an immediate upgrade recommendation to version 5.5.0. Both CVE-2025-49656 and CVE-2025-50 … Read more Published Date: Jul 22, 2025 (4 hours, 37 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-50151 CVE-2025-49656

CVE-2025-8017 – A vulnerability was found in Tenda AC7 15.03.06.44

The following table lists the changes that have been made to the CVE-2025-8017 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-51867 – Insecure Direct Object Reference (IDOR) vulnerabil

The following table lists the changes that have been made to the CVE-2025-51867 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.