Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Tenable updates Vulnerability Priority Rating scoring method to flag fewer vulnerabilities as critical

      July 24, 2025

      Google adds updated workspace templates in Firebase Studio that leverage new Agent mode

      July 24, 2025

      AI and its impact on the developer experience, or ‘where is the joy?’

      July 23, 2025

      Google launches OSS Rebuild tool to improve trust in open source packages

      July 23, 2025

      Atomic Design Certification Course

      July 24, 2025

      How to streamline GitHub API calls in Azure Pipelines

      July 24, 2025

      Reform Collective: A New Website, Designed to Be Seen

      July 24, 2025

      Motion Highlights #11

      July 24, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 24, 2025
      Recent

      The details of TC39’s last meeting

      July 24, 2025

      Building Scalable APIs with Node.js and TypeScript

      July 24, 2025

      What’s new in ECMAScript 2025

      July 24, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      How to Open Control Panel in Windows 11

      July 24, 2025
      Recent

      How to Open Control Panel in Windows 11

      July 24, 2025

      How to Shut Down Windows 11

      July 24, 2025

      What is Digital Music?

      July 24, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-7382 – A command injection vulnerability in WebAdmin of S

    CVE-2025-7382 – A command injection vulnerability in WebAdmin of S

    July 21, 2025

    CVE ID : CVE-2025-7382

    Published : July 21, 2025, 2:15 p.m. | 9 hours, 59 minutes ago

    Description : A command injection vulnerability in WebAdmin of Sophos Firewall versions older than 21.0 MR2 (21.0.2) can lead to adjacent attackers achieving pre-auth code execution on High Availability (HA) auxiliary devices, if OTP authentication for the admin user is enabled.

    Severity: 8.8 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-7624 – An SQL injection vulnerability in the legacy (tran
    Next Article CVE-2024-13974 – A business logic vulnerability in the Up2Date comp

    Related Posts

    Development

    UNC6148 Backdoors Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit

    July 24, 2025
    Development

    Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access

    July 24, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services

    Security

    CVE-2025-46781 – Apache OpenOffice Insufficient Input Validation

    Common Vulnerabilities and Exposures (CVEs)

    Meta’s Q1 2025 Report: Dismantling Covert Influence Campaigns from China, Iran, and Romania

    Security

    CVE-2025-47302 – Apache HTTP Server Unvalidated User Input

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-48384 – Git Symlink Execution Vulnerability

    July 9, 2025

    CVE ID : CVE-2025-48384

    Published : July 8, 2025, 7:15 p.m. | 11 hours, 9 minutes ago

    Description : Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.

    Severity: 8.0 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Windows Central Podcast: Xbox Ally is official, and Aero Glass is back?

    June 13, 2025

    CVE-2025-46242 – Watu Quiz SQL Injection

    April 22, 2025

    Kritiek Veeam-lek laat aanvaller code op back-upserver uitvoeren

    June 18, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.