CVE-2016-15044 – Kaltura Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2016-15044 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 23, 2025 Action […]
CVE-2025-54377 – Roo Code Multi-Line Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-54377 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 23, 2025 Action […]
CVE-2025-54371 – Apache Struts Remote Code Execution
The following table lists the changes that have been made to the CVE-2025-54371 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Jul. 23, 2025 Action Type […]
CVE-2025-53942 – Authentik OAuth/SAML Deactivated User Partial Access Vulnerability
The following table lists the changes that have been made to the CVE-2025-53942 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 23, 2025 Action […]
CVE-2025-53537 – LibHTP HTTP Protocol Parsing Memory Leak Vulnerability
The following table lists the changes that have been made to the CVE-2025-53537 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 23, 2025 Action […]
CVE-2025-47281 – Kyverno JMESPath Variable Substitution Denial of Service
Kyverno is a policy engine designed for cloud native platform engineering teams. In versions 1.14.1 and below, a Denial of Service (DoS) vulnerability exists due to improper handling of JMESPath variable substitutions. Attackers with permissions to create or update Kyverno policies can craft expressions using the {{@}} variable combined with a pipe and an invalid […]
CVE-2025-32019 – Harbor Cross-Site Scripting (XSS) Vulnerability
The following table lists the changes that have been made to the CVE-2025-32019 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 23, 2025 Action […]
CVE-2025-8058 – “GNU C Library Regcomp Double Free Vulnerability”
The following table lists the changes that have been made to the CVE-2025-8058 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 3ff69d7a-14f2-4f67-a097-88dee7810d18 Jul. 23, 2025 Action […]
CVE-2025-44109 – Pinokio URL Redirection Vulnerability
The following table lists the changes that have been made to the CVE-2025-44109 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 23, 2025 Action […]
What to know about ToolShell, the SharePoint threat under mass exploitation
What to know about ToolShell, the SharePoint threat under mass exploitation Active exploitation at scale Easy to exploit. Unauthenticated access. Massive reach. ToolShell has it all. Credit: Getty Images Government agencies and private industry have been under siege over the … Read more Published Date: Jul 23, 2025 (2 hours, 56 minutes ago) Vulnerabilities has been mentioned […]