CVE-2025-23210 – “PhpSpreadsheet XSS Protocol Bypass”
The following table lists the changes that have been made to the CVE-2025-23210 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]
CVE-2025-22129 – Tuleap Unauthorized Access Information Disclosure
The following table lists the changes that have been made to the CVE-2025-22129 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]
CVE-2024-47770 – “Apache Wazuh Privilege Escalation Vulnerability”
Wazuh is a free and open source platform used for threat prevention, detection, and response. It is capable of protecting workloads across on-premises, virtualized, containerized, and cloud-based environments. This vulnerability occurs when the system has weak privilege access, that allows an attacker to do privilege escalation. In this case the attacker is able to view […]
CVE-2024-35177 – Wazuh Windows Local Privilege Escalation Vulnerability
Wazuh is a free and open source platform used for threat prevention, detection, and response. It is capable of protecting workloads across on-premises, virtualized, containerized, and cloud-based environments. The wazuh-agent for Windows is vulnerable to a Local Privilege Escalation vulnerability due to improper ACL of the non-default installation directory. A local malicious user could potentially […]
CVE-2025-24962 – reNgine Nmap Command Injection
The following table lists the changes that have been made to the CVE-2025-24962 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]
CVE-2025-24961 – Amazon S3Proxy Local File Exposure Remote File System Information Disclosure
The following table lists the changes that have been made to the CVE-2025-24961 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]
CVE-2025-24960 – Jellystat Path Traversal Vulnerability in Jellyfin Statistics App
The following table lists the changes that have been made to the CVE-2025-24960 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]
CVE-2025-24959 – “Zx Dotenv Environment Variable Injection Vulnerability (Command Execution)”
zx is a tool for writing better scripts. An attacker with control over environment variable values can inject unintended environment variables into `process.env`. This can lead to arbitrary command execution or unexpected behavior in applications that rely on environment variables for security-sensitive operations. Applications that process untrusted input and pass it through `dotenv.stringify` are particularly […]
CVE-2025-24899 – reNgine Insecure Data Exposure Within User Information
reNgine is an automated reconnaissance framework for web applications. A vulnerability was discovered in reNgine, where **an insider attacker with any role** (such as Auditor, Penetration Tester, or Sys Admin) **can extract sensitive information from other reNgine users.** After running a scan and obtaining vulnerabilities from a target, the attacker can retrieve details such as […]
CVE-2025-24370 – Django-Unicorn Python Class Pollution Vulnerability
Django-Unicorn adds modern reactive component functionality to Django templates. Affected versions of Django-Unicorn are vulnerable to python class pollution vulnerability. The vulnerability arises from the core functionality `set_property_value`, which can be remotely triggered by users by crafting appropriate component requests and feeding in values of second and third parameter to the vulnerable function, leading to […]