APPLE-SA-08-20-2025-1 iOS 18.6.2 and iPadOS 18.6.2

APPLE-SA-08-20-2025-1 iOS 18.6.2 and iPadOS 18.6.2 Full Disclosure mailing list archives From: Apple Product Security via Fulldisclosure Date: Wed, 20 Aug 2025 17:08:52 -0700 —–BEGIN PGP SIGNED MESSAGE—– Hash: SH … Read more Published Date: Sep 08, 2025 (3 hours, 40 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-43300

CVE-2025-58451 – Cattown Vulnerable to Inefficient Regular Expression Complexity and Uncontrolled Resource Consumption

Cattown is a JavaScript markdown parser. Versions prior to 1.0.2 used regular expressions with inefficient, potentially exponential worst-case complexity. This could cause excessive CPU usage due to excessive backtracking on crafted inputs. In turn, the excessive CPU usage could lead to resource exhaustion, where processing malicious inputs could cause high CPU or memory usage, potentially […]

CVE-2025-58450 – pREST has Systemic SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-58450 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 08, 2025 Action […]

CVE-2025-58449 – Maho Vulnerable to Authenticated Remote Code Execution via File Upload

The following table lists the changes that have been made to the CVE-2025-58449 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 08, 2025 Action […]

CVE-2025-58444 – MCP Inspector is Vulnerable to Potential Command Execution via XSS When Connecting to an Untrusted MCP Server

The following table lists the changes that have been made to the CVE-2025-58444 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 08, 2025 Action […]

CVE-2025-58365 – XWiki Blog Application: Privilege Escalation (PR) from account through blog content

The following table lists the changes that have been made to the CVE-2025-58365 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 08, 2025 Action […]

CVE-2025-57815 – Fides Lacks Brute-Force Protections on Authentication Endpoints

Fides is an open-source privacy engineering platform. Prior to version 2.69.1, the Fides Admin UI login endpoint relies on a general IP-based rate limit for all API traffic and lacks specific anti-automation controls designed to protect against brute-force attacks. This could allow attackers to conduct credential testing attacks, such as credential stuffing or password spraying, […]

CVE-2025-10108 – Campcodes Online Loan Management System ajax.php sql injection

The following table lists the changes that have been made to the CVE-2025-10108 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 08, 2025 Action […]

CVE-2025-57817 – Fides Webserver API is Vulnerable to OAuth Client Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-57817 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 08, 2025 Action […]