CVE-2024-49343 – IBM Informix Dynamic Server HTML Injection Vulnerability

The following table lists the changes that have been made to the CVE-2024-49343 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]

CVE-2025-2297 – Apache Struts Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-2297 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 13061848-ea10-403d-bd75-c83a022c2891 Jul. 28, 2025 Action […]

CVE-2024-49342 – IBM Informix Dynamic Server Authentication Bypass

The following table lists the changes that have been made to the CVE-2024-49342 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]

CVE-2025-54418 – CodeIgniter ImageMagick Command Injection Vulnerability

CodeIgniter is a PHP full-stack web framework. A command injection vulnerability present in versions prior to 4.6.2 affects applications that use the ImageMagick handler for image processing (`imagick` as the image library) and either allow file uploads with user-controlled filenames and process uploaded images using the `resize()` method or use the `text()` method with user-controlled […]

CVE-2025-53696 – iSTAR Ultra Firmware Verification Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-53696 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]

CVE-2025-30125 – Marbella KR8s Dashcam Weak Password Authentication Vulnerability

The following table lists the changes that have been made to the CVE-2025-30125 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]

UNC3886 Hackers Exploiting 0-Days in VMware vCenter/ESXi, Fortinet FortiOS, and Junos OS

UNC3886 Hackers Exploiting 0-Days in VMware vCenter/ESXi, Fortinet FortiOS, and Junos OS Singapore’s critical infrastructure is under siege from UNC3886, a sophisticated China-linked advanced persistent threat (APT) group. As of July 2025, the group has been actively targeting essential s … Read more Published Date: Jul 28, 2025 (1 hour, 47 minutes ago) Vulnerabilities has been mentioned […]

Duizenden WordPress-sites kwetsbaar door kritiek RCE-lek in plug-in

Duizenden WordPress-sites kwetsbaar door kritiek RCE-lek in plug-in Duizenden WordPress-sites maken gebruik van een plug-in met een kritieke kwetsbaarheid die remote code execution (RCE) door een ongeauthenticeerde aanvaller mogelijk maakt. Een beveiligingsupdate is b … Read more Published Date: Jul 28, 2025 (2 hours, 17 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-7360 CVE-2025-7341 CVE-2025-7340

CVE-2025-8279 – GitLab Language Server GraphQL Query Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-8279 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]

CVE-2025-53695 – iSTAR Ultra OS Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-53695 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]