CVE-2025-8249 – Apache Code-projects Exam Form Submission SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-8249 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]

CVE-2025-8248 – Code-projects Online Ordering System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-8248 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]

CVE-2023-53158 – Apache Gix Command Execution Vulnerability

The following table lists the changes that have been made to the CVE-2023-53158 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]

Critical Command Injection (CVE-2025-54416) in tj-actions/branch-names GitHub Action Exposes 5,000+ Repos

Critical Command Injection (CVE-2025-54416) in tj-actions/branch-names GitHub Action Exposes 5,000+ Repos A critical command injection vulnerability has been disclosed in the widely used GitHub Action tj-actions/branch-names, affecting over 5,000 public repositories. Assigned CVE-2025-54416 with a CVSS sc … Read more Published Date: Jul 28, 2025 (13 hours, 24 minutes ago) Vulnerabilities has been mentioned in this article. […]

Fire Ant: Stealthy Cyber-Espionage Campaign Targets VMware ESXi & vCenter, Evades Detection

Fire Ant: Stealthy Cyber-Espionage Campaign Targets VMware ESXi & vCenter, Evades Detection A stealthy and highly sophisticated cyber-espionage campaign known as Fire Ant has been uncovered by Sygnia’s Incident Response and Threat Intelligence teams. Operating beneath the radar since early 2 … Read more Published Date: Jul 28, 2025 (13 hours, 38 minutes ago) Vulnerabilities has been […]

RCE, SSRF & Data Exposure: Salesforce Patches 8 Serious Flaws in Tableau Server

RCE, SSRF & Data Exposure: Salesforce Patches 8 Serious Flaws in Tableau Server Salesforce has released a security advisory addressing eight serious vulnerabilities affecting multiple versions of Tableau Server, the widely used data visualization and business intelligence platfor … Read more Published Date: Jul 28, 2025 (13 hours, 39 minutes ago) Vulnerabilities has been mentioned in this […]

CERT Warns of Privilege Escalation Vulnerability in Lakeside SysTrack (CVE-2025-6241)

CERT Warns of Privilege Escalation Vulnerability in Lakeside SysTrack (CVE-2025-6241) The CERT Coordination Center (CERT/CC) has issued a Vulnerability Note detailing a critical privilege escalation flaw affecting SysTrack, a widely deployed endpoint monitoring tool developed by Lakesi … Read more Published Date: Jul 28, 2025 (13 hours, 55 minutes ago) Vulnerabilities has been mentioned in this article. […]

CVE-2025-8247 – Projectworlds Online Admission System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-8247 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]

CVE-2023-53157 – Rosenpass Crate Denial of Service Vulnerability

The following table lists the changes that have been made to the CVE-2023-53157 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]