CVE-2025-51991 – XWiki Server-Side Template Injection Vulnerability
XWiki through version 17.3.0 is vulnerable to Server-Side Template Injection (SSTI) in the Administration interface, specifically within the HTTP Meta Info field of the Global Preferences Presentation section. An authenticated administrator can inject crafted Apache Velocity template code, which is rendered on the server side without proper validation or sandboxing. This enables the execution of […]
CVE-2025-51990 – XWiki Cross-Site Scripting (XSS) Vulnerability
XWiki through version 17.3.0 is affected by multiple stored Cross-Site Scripting (XSS) vulnerabilities in the Administration interface, specifically under the Presentation section of the Global Preferences panel. An authenticated administrator can inject arbitrary JavaScript payloads into the HTTP Meta Info, Footer Copyright, and Footer Version fields. These inputs are stored and subsequently rendered without proper […]
CVE-2025-50864 – Elysia-Cors Origin Validation Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-50864 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 20, 2025 Action […]
CVE-2025-43748 – Liferay Portal Cross-Site Request Forgery (CSRF)
Insufficient CSRF protection for omni-administrator users in Liferay Portal 7.0.0 through 7.4.3.119, and Liferay DXP 2024.Q1.1 through 2024.Q1.6, 2023.Q4.0 through 2023.Q4.9, 2023.Q3.1 through 2023.Q3.9, 7.4 GA through update 92, 7.3 GA through update 36, and older unsupported versions allows attackers to execute Cross-Site Request Forgery
CVE-2025-36114 – IBM QRadar SOAR Plugin App Directory Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-36114 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 20, 2025 Action […]
CVE-2025-1142 – IBM Edge Application Manager SSRF Vulnerability
The following table lists the changes that have been made to the CVE-2025-1142 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 20, 2025 Action […]
CVE-2025-1139 – IBM Edge Application Manager Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-1139 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 20, 2025 Action […]
CVE-2024-57491 – “Jobx Authentication Bypass”
The following table lists the changes that have been made to the CVE-2024-57491 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Aug. 20, 2025 Action Type […]
Commvault plugs holes in backup suite that allow remote code execution
Commvault plugs holes in backup suite that allow remote code execution Commvault has fixed four security vulnerabilities that may allow unauthenticated attackers to compromise on-premises deployments of its flagship backup and replication suite. Technical details about t … Read more Published Date: Aug 20, 2025 (1 hour, 43 minutes ago) Vulnerabilities has been mentioned in this article. […]
CVE-2025-9074 – “Docker Desktop Unauthenticated Engine API Access Vulnerability”
A vulnerability was identified in Docker Desktop that allows local running Linux containers to access the Docker Engine API via the configured Docker subnet, at 192.168.65.7:2375 by default. This vulnerability occurs with or without Enhanced Container Isolation (ECI) enabled, and with or without the “Expose daemon on tcp://localhost:2375 without TLS” option enabled. This can lead […]