CVE-2025-4690

A regular expression used by AngularJS'  linky https://docs.angularjs.org/api/ngSanitize/filter/linky  filter to detect URLs in input text is vulnerable to super-linear runtime due to backtrack ...

Continue Reading
CVE-2025-4690

creation_timestamp| type| source ---|---|--- 2025-08-19 13:33:36+00:00| seen|...Read More ...

Continue Reading
CVE-2025-54336

creation_timestamp| type| source ---|---|--- 2025-08-19 13:47:15+00:00| seen|...Read More ...

Continue Reading
CVE-2025-22097

creation_timestamp| type| source ---|---|--- 2025-08-19 13:20:56+00:00| seen|...Read More ...

Continue Reading
CVE-2025-4690 AngularJS ‘linky’ filter ReDoS

A regular expression used by AngularJS'  linky https://docs.angularjs.org/api/ngSanitize/filter/linky  filter to detect URLs in input text is vulnerable to super-linear runtime due to backtrack ...

Continue Reading
CVE-2025-4690 AngularJS ‘linky’ filter ReDoS

A regular expression used by AngularJS'  linky https://docs.angularjs.org/api/ngSanitize/filter/linky  filter to detect URLs in input text is vulnerable to super-linear runtime due to backtrack ...

Continue Reading
Exploit for Path Traversal in Xwiki

XWiki Commons XWiki Commons are technical libraries common to several other top level XWiki projects. These libraries can be used by projects outside of the XWiki ecosystem, are generic and not relat ...

Continue Reading
Exploit for OS Command Injection in Jenkins Script_Security

Script Security Plugin User’s guide (adapted from information on Template plugin in CloudBees Plugins guide) Various Jenkins plugins require that users define custom scripts, most commonly in the ...

Continue Reading

Back to Main

Subscribe for the latest news: