CVE-2025-51667 – Simple-Admin-Core SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-51667 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2025-50979 – NodeBB SQL Injection

The following table lists the changes that have been made to the CVE-2025-50979 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

Emulating the Expedited Warlock Ransomware

Emulating the Expedited Warlock Ransomware Introduction Warlock is a ransomware strain operating under the Ransomware-as-a-Service (RaaS) model that emerged in June 2025, following an advertisement on the Russian Anonymous Marketplace (RAMP) w … Read more Published Date: Aug 27, 2025 (3 hours, 30 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-53771 CVE-2025-53770 CVE-2025-49706 CVE-2025-49704 CVE-2022-30190

Global Salt Typhoon hacking campaigns linked to Chinese tech firms

Global Salt Typhoon hacking campaigns linked to Chinese tech firms The U.S. National Security Agency (NSA), the UK’s National Cyber Security Centre (NCSC), and partners from over a dozen countries have linked the Salt Typhoon global hacking campaigns to three China-b … Read more Published Date: Aug 27, 2025 (1 hour, 39 minutes ago) Vulnerabilities has been […]

CVE-2025-5187 – Kubernetes NodeRestriction OwnerReference Deletion Vulnerability

The following table lists the changes that have been made to the CVE-2025-5187 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2025-57821 – Basecamp Open-Redirect Vulnerability

The following table lists the changes that have been made to the CVE-2025-57821 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2025-34161 – Coolify Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-34161 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2025-34159 – Coolify Docker Compose Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-34159 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2025-34157 – Coolify Stored XSS Vulnerability

The following table lists the changes that have been made to the CVE-2025-34157 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript

IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript A stored cross-site scripting (XSS) flaw identified in IPFire 2.29’s web-based firewall interface (firewall.cgi). Tracked as CVE-2025-50975, the vulnerability allows any authenticated administrator to … Read more Published Date: Aug 27, 2025 (1 hour, 59 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-50975 CVE-2025-54309