CVE-2025-51667 – Simple-Admin-Core SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-51667 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
CVE-2025-50979 – NodeBB SQL Injection
The following table lists the changes that have been made to the CVE-2025-50979 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
Emulating the Expedited Warlock Ransomware
Emulating the Expedited Warlock Ransomware Introduction Warlock is a ransomware strain operating under the Ransomware-as-a-Service (RaaS) model that emerged in June 2025, following an advertisement on the Russian Anonymous Marketplace (RAMP) w … Read more Published Date: Aug 27, 2025 (3 hours, 30 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-53771 CVE-2025-53770 CVE-2025-49706 CVE-2025-49704 CVE-2022-30190
Global Salt Typhoon hacking campaigns linked to Chinese tech firms
Global Salt Typhoon hacking campaigns linked to Chinese tech firms The U.S. National Security Agency (NSA), the UK’s National Cyber Security Centre (NCSC), and partners from over a dozen countries have linked the Salt Typhoon global hacking campaigns to three China-b … Read more Published Date: Aug 27, 2025 (1 hour, 39 minutes ago) Vulnerabilities has been […]
CVE-2025-5187 – Kubernetes NodeRestriction OwnerReference Deletion Vulnerability
The following table lists the changes that have been made to the CVE-2025-5187 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
CVE-2025-57821 – Basecamp Open-Redirect Vulnerability
The following table lists the changes that have been made to the CVE-2025-57821 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
CVE-2025-34161 – Coolify Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-34161 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
CVE-2025-34159 – Coolify Docker Compose Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-34159 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
CVE-2025-34157 – Coolify Stored XSS Vulnerability
The following table lists the changes that have been made to the CVE-2025-34157 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript
IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript A stored cross-site scripting (XSS) flaw identified in IPFire 2.29’s web-based firewall interface (firewall.cgi). Tracked as CVE-2025-50975, the vulnerability allows any authenticated administrator to … Read more Published Date: Aug 27, 2025 (1 hour, 59 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-50975 CVE-2025-54309