CVE-2025-8961 – LibTIFF TIFFcrop Heap-Based Buffer Overflow
The following table lists the changes that have been made to the CVE-2025-8961 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-8963 – Jeecgboot JimuReport Remote Deserialization Vulnerability
The following table lists the changes that have been made to the CVE-2025-8963 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-8715 – PostgreSQL SQL Injection
Improper neutralization of newlines in pg_dump in PostgreSQL allows a user of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands inside a purpose-crafted object name. The same attacks can achieve SQL injection as a superuser of the restore […]
CVE-2025-8714 – PostgreSQL Arbitrary Code Execution Vulnerability
Untrusted data inclusion in pg_dump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands. pg_dumpall is also affected. pg_restore is affected when used to generate a plain-format dump. This is similar to […]
CVE-2025-8713 – PostgreSQL View and Row Security Statistics Information Disclosure
PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access. Separately, statistics allow a user to read sampled data that a row security policy intended to hide. PostgreSQL maintains statistics for tables by sampling data available in columns; this data is consulted during the query planning process. […]
CVE-2023-5342 – Apache Struts Remote Code Execution
The following table lists the changes that have been made to the CVE-2023-5342 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Aug. 14, 2025 Action Type […]
Canada’s House of Commons investigating data breach after cyberattack
Canada’s House of Commons investigating data breach after cyberattack The House of Commons of Canada is currently investigating a data breach after a threat actor reportedly stole employee information in a cyberattack on Friday. While the lower house of the Parliament o … Read more Published Date: Aug 14, 2025 (33 minutes ago) Vulnerabilities has been […]
CVE-2025-8960 – Campcodes Online Flight Booking Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-8960 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
Zoom Urges Windows Users to Update After Severe CVE-2025-49457 Security Flaw
Zoom Urges Windows Users to Update After Severe CVE-2025-49457 Security Flaw A critical security vulnerability has recently been discovered in certain versions of Zoom Clients for Windows that could expose users to cybersecurity risks, including privilege escalation via networ … Read more Published Date: Aug 14, 2025 (1 hour, 43 minutes ago) Vulnerabilities has been mentioned in […]
Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code – PoC Released
Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code – PoC Released Critical vulnerabilities in Xerox FreeFlow Core, a widely-used print orchestration platform, allow unauthenticated remote attackers to execute malicious code on vulnerable systems. The flaws, tracked … Read more Published Date: Aug 14, 2025 (2 hours, 21 minutes ago) Vulnerabilities has been mentioned in this […]