CVE-2025-53928

creation_timestamp| type| source ---|---|--- 2025-07-17 15:06:22+00:00| seen|...Read More ...

Continue Reading
CVE-2025-5346

creation_timestamp| type| source ---|---|--- 2025-07-17 15:02:05+00:00| seen|...Read More ...

Continue Reading
CVE-2025-53927

creation_timestamp| type| source ---|---|--- 2025-07-17 15:26:25+00:00| seen|...Read More ...

Continue Reading
CVE-2025-5344

creation_timestamp| type| source ---|---|--- 2025-07-17 15:21:24+00:00| seen|...Read More ...

Continue Reading
CVE-2025-53817

creation_timestamp| type| source ---|---|--- 2025-07-17 15:21:08+00:00| seen|...Read More ...

Continue Reading
Fastify: Remote Code Execution via unsafe usage of `reply.view({ raw })` in @fastify/view (EJS template engine)

The @fastify/view plugin, when used with the EJS engine and the reply.view({ raw: <user-controlled-string> }) pattern, allowed arbitrary EJS execution. This vulnerability arose from the ...

Continue Reading
curl: Speculative Execution Side-Channel in `curl`

Vulnerability description not...Read More ...

Continue Reading
curl: HTTP/2 CONTINUATION Flood Vulnerability

Vulnerability description not...Read More ...

Continue Reading

Back to Main

Subscribe for the latest news: