Skip to content

Commit af9c293

Browse files
authored
Apply suggestions from PCX review
1 parent 6f64ffe commit af9c293

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

src/content/changelog/waf/2025-07-28-waf-release.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,16 @@ date: 2025-07-28
66

77
import { RuleID } from "~/components";
88

9-
This week’s update spotlights several vulnerabilities across Apache Tomcat, MongoDB,Fortinet FortiWeb . Several flaws related with a memory leak in Apache Tomcat can lead to a denial-of-service attack. Additionally, a code injection flaw in MongoDB's Mongoose library allows attackers to bypass security controls to access restricted data.
9+
This week’s update spotlights several vulnerabilities across Apache Tomcat, MongoDB, and Fortinet FortiWeb. Several flaws related with a memory leak in Apache Tomcat can lead to a denial-of-service attack. Additionally, a code injection flaw in MongoDB's Mongoose library allows attackers to bypass security controls to access restricted data.
1010

1111

1212
**Key Findings**
1313

14-
- Fortinet FortiWeb (CVE-2025-25257): An improper neutralization of special elements used in an SQL command vulnerability in Fortinet FortiWeb versions allows an unauthenticated attacker to execute unauthorized SQL code or commands.
14+
- Fortinet FortiWeb (CVE-2025-25257): An improper neutralization of special elements used in a SQL command vulnerability in Fortinet FortiWeb versions allows an unauthenticated attacker to execute unauthorized SQL code or commands.
1515

1616
- Apache Tomcat (CVE-2025-31650): A improper Input Validation vulnerability in Apache Tomcat that could create memory leak when incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request.
1717

18-
- MongoDB (CVE-2024-53900, CVE:CVE-2025-23061): Improperly use $where in match and a nested $where filter with a populate() match in Mongoose that leads to search injection.
18+
- MongoDB (CVE-2024-53900, CVE:CVE-2025-23061): Improper use of `$where` in match and a nested `$where` filter with a `populate()` match in Mongoose can lead to search injection.
1919

2020
**Impact**
2121

src/content/changelog/waf/scheduled-waf-release.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: WAF Release - Scheduled changes for 2025-07-28
2+
title: WAF Release - Scheduled changes for 2025-08-04
33
description: WAF managed ruleset changes scheduled for 2025-08-04
44
date: 2025-07-28
55
scheduled: true
@@ -50,7 +50,7 @@ import { RuleID } from "~/components";
5050
<td>
5151
<RuleID id="bba3d37891a440fb8bc95b970cbd9abc" />
5252
</td>
53-
<td>Wordpress - Information Disclosure - CVE:CVE-2023-5561</td>
53+
<td>WordPress - Information Disclosure - CVE:CVE-2023-5561</td>
5454
<td>This is a New Detection</td>
5555
</tr>
5656
<tr>
@@ -83,7 +83,7 @@ import { RuleID } from "~/components";
8383
<td>
8484
<RuleID id="9b5c5e13d2ca4253a89769f2194f7b2d" />
8585
</td>
86-
<td>Wordpress:Plugin:WPBookit - Remote Code Execution - CVE:CVE-2025-6058</td>
86+
<td>WordPress:Plugin:WPBookit - Remote Code Execution - CVE:CVE-2025-6058</td>
8787
<td>This is a New Detection</td>
8888
</tr>
8989
<tr>
@@ -94,7 +94,7 @@ import { RuleID } from "~/components";
9494
<td>
9595
<RuleID id="69d43d704b0641898141a4300bf1b661" />
9696
</td>
97-
<td>Wordpress:Theme:Motors - Privilege Escalation - CVE:CVE-2025-4322</td>
97+
<td>WordPress:Theme:Motors - Privilege Escalation - CVE:CVE-2025-4322</td>
9898
<td>This is a New Detection</td>
9999
</tr>
100100
</tbody>

0 commit comments

Comments
 (0)