CVE-2025-21554 – Oracle Communications Order and Service Management HTTP Unauthorized Read Access Vulnerability

The following table lists the changes that have been made to the CVE-2025-21554 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 21, 2025 Action […]

CVE-2025-21558 – Oracle Primavera P6 Enterprise Project Portfolio Management HTTP Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-21558 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 21, 2025 Action […]

CVE-2025-21557 – Oracle Application Express Unauthenticated Stored XSS

The following table lists the changes that have been made to the CVE-2025-21557 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 21, 2025 Action […]

CVE-2025-21556 – “Oracle Agile PLM Framework – HTTP Takeover Vulnerability”

The following table lists the changes that have been made to the CVE-2025-21556 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 21, 2025 Action […]

CVE-2025-21553 – Oracle Database Server Java VM Unauthorized Access and Modification Vulnerability

The following table lists the changes that have been made to the CVE-2025-21553 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 21, 2025 Action […]

CVE-2025-21552 – Oracle JD Edwards EnterpriseOne Orchestrator HTTP Vulnerability (Authorization Bypass)

The following table lists the changes that have been made to the CVE-2025-21552 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 21, 2025 Action […]

CVE-2025-21551 – Oracle Solaris File System File System Control and Data Integrity Violation

The following table lists the changes that have been made to the CVE-2025-21551 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 21, 2025 Action […]

CVE-2025-21550 – Oracle Financial Services Behavior Detection Platform HTTP Web UI Confirmed Man-in-the-Middle (CIMIME)

The following table lists the changes that have been made to the CVE-2025-21550 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 21, 2025 Action […]

CVE-2025-21549 – “Oracle WebLogic Server Core HTTP/2 DOS Vulnerability”

The following table lists the changes that have been made to the CVE-2025-21549 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 21, 2025 Action […]