CVE-2025-8312 – Devolutions Server PAM Deadlock Password Persistence Vulnerability

The following table lists the changes that have been made to the CVE-2025-8312 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Jul. 30, 2025 Action Type […]

CVE-2025-54656 – Apache Struts LookupDispatchAction Log Injection

The following table lists the changes that have been made to the CVE-2025-54656 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]

CVE-2025-50578 – LinuxServer.io Heimdall HTTP Header Injection and Open Redirect Vulnerability

LinuxServer.io heimdall 2.6.3-ls307 contains a vulnerability in how it handles user-supplied HTTP headers, specifically `X-Forwarded-Host` and `Referer`. An unauthenticated remote attacker can manipulate these headers to perform Host Header Injection and Open Redirect attacks. This allows the loading of external resources from attacker-controlled domains and unintended redirection of users, potentially enabling phishing, UI redress, and […]

CVE-2023-2593 – Linux TCP Connection Denial of Service

The following table lists the changes that have been made to the CVE-2023-2593 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]

Apple patches security flaw exploited in Chrome zero-day attacks

Apple patches security flaw exploited in Chrome zero-day attacks Apple has released security updates to address a high-severity vulnerability that has been exploited in zero-day attacks targeting Google Chrome users. Tracked as CVE-2025-6558, the security bug is du … Read more Published Date: Jul 30, 2025 (3 hours, 21 minutes ago) Vulnerabilities has been mentioned in this […]

5 Email Attacks SOCs Cannot Detect Without A Sandbox

5 Email Attacks SOCs Cannot Detect Without A Sandbox Even with Slack, Teams, and every new communication tool out there, email remains the top attack vector for businesses. Why? Because it’s familiar, trusted, and easy to exploit. One convincing message … Read more Published Date: Jul 30, 2025 (1 hour, 52 minutes ago) Vulnerabilities has been mentioned […]

CVE-2025-54573 – CVAT Unvalidated Email Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-54573 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]

CVE-2025-54433 – Bugsink File Path Traversal Vulnerability

Bugsink is a self-hosted error tracking service. In versions 1.4.2 and below, 1.5.0 through 1.5.4, 1.6.0 through 1.6.3, and 1.7.0 through 1.7.3, ingestion paths construct file locations directly from untrusted event_id input without validation. A specially crafted event_id can result in paths outside the intended directory, potentially allowing file overwrite or creation in arbitrary locations. […]

CVE-2025-53944 – AutoGPT Authorization Bypass Vulnerability

AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents. In v0.6.15 and below, the external API’s get_graph_execution_results endpoint has an authorization bypass vulnerability. While it correctly validates user access to the graph_id, it fails to verify ownership of the graph_exec_id parameter, allowing authenticated users to access any execution […]

CVE-2025-53357 – GLPI Unauthorized Reservation Alteration

GLPI, which stands for Gestionnaire Libre de Parc Informatique, is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 0.78 through 10.0.18, a connected user can alter the reservations of another user. This is fixed in version 10.0.19.