CVE-2025-8961 – LibTIFF TIFFcrop Heap-Based Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-8961 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]

CVE-2025-8963 – Jeecgboot JimuReport Remote Deserialization Vulnerability

The following table lists the changes that have been made to the CVE-2025-8963 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]

CVE-2025-8715 – PostgreSQL SQL Injection

Improper neutralization of newlines in pg_dump in PostgreSQL allows a user of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands inside a purpose-crafted object name. The same attacks can achieve SQL injection as a superuser of the restore […]

CVE-2025-8714 – PostgreSQL Arbitrary Code Execution Vulnerability

Untrusted data inclusion in pg_dump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands. pg_dumpall is also affected. pg_restore is affected when used to generate a plain-format dump. This is similar to […]

CVE-2025-8713 – PostgreSQL View and Row Security Statistics Information Disclosure

PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access. Separately, statistics allow a user to read sampled data that a row security policy intended to hide. PostgreSQL maintains statistics for tables by sampling data available in columns; this data is consulted during the query planning process. […]

CVE-2023-5342 – Apache Struts Remote Code Execution

The following table lists the changes that have been made to the CVE-2023-5342 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Aug. 14, 2025 Action Type […]

Canada’s House of Commons investigating data breach after cyberattack

Canada’s House of Commons investigating data breach after cyberattack The House of Commons of Canada is currently investigating a data breach after a threat actor reportedly stole employee information in a cyberattack on Friday. While the lower house of the Parliament o … Read more Published Date: Aug 14, 2025 (33 minutes ago) Vulnerabilities has been […]

CVE-2025-8960 – Campcodes Online Flight Booking Management System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-8960 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]

Zoom Urges Windows Users to Update After Severe CVE-2025-49457 Security Flaw

Zoom Urges Windows Users to Update After Severe CVE-2025-49457 Security Flaw A critical security vulnerability has recently been discovered in certain versions of Zoom Clients for Windows that could expose users to cybersecurity risks, including privilege escalation via networ … Read more Published Date: Aug 14, 2025 (1 hour, 43 minutes ago) Vulnerabilities has been mentioned in […]

Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code – PoC Released

Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code – PoC Released Critical vulnerabilities in Xerox FreeFlow Core, a widely-used print orchestration platform, allow unauthenticated remote attackers to execute malicious code on vulnerable systems. The flaws, tracked … Read more Published Date: Aug 14, 2025 (2 hours, 21 minutes ago) Vulnerabilities has been mentioned in this […]