creation_timestamp| type| source ---|---|--- 2025-07-25 15:08:01+00:00| seen|...Read More ...
Continue ReadingJuly 25, 2025
Security Advisory Description AMI's SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of t ...
Continue ReadingJuly 25, 2025
On July 19, 2025, a critical remote code execution (RCE) vulnerability (CVE-2025-53770, also referred to as ToolShell) was publicly disclosed, impacting on-premises Microsoft SharePoint Server install ...
Continue ReadingJuly 25, 2025
Path-Traversal -> Arbitrary File Write in Assemblyline Service Client 1. Summary The Assemblyline 4 service client (task_handler.py) accepts a SHA-256 value returned by the service server and ...
Continue ReadingJuly 25, 2025
Impact It's possible to execute any SQL query in Oracle by using the function like DBMS_XMLGEN or DBMS_XMLQUERY. The XWiki#searchDocuments APIs are not sanitizing the query at all and even if the ...
Continue ReadingJuly 25, 2025
LF Edge eKuiper is a lightweight IoT data analytics and stream processing engine running on resource-constraint edge devices. In versions before 2.2.1, there is a critical SQL Injection vulnerability ...
Continue ReadingJuly 25, 2025
Quiet is an alternative to team chat apps like Slack, Discord, and Element that does not require trusting a central server or running one's own. In versions 6.1.0-alpha.4 and below, Quiet's ...
Continue ReadingJuly 25, 2025
JHipster before v.8.9.0 allows privilege escalation via a modified authorities parameter. Upon registering in the JHipster portal and logging in as a standard user, the authorities parameter in the re ...
Continue ReadingJuly 25, 2025
Back to Main