CVE-2025-0960 – AutomationDirect C-more EA9 HMI Integer Underflow Remote Code Execution

The following table lists the changes that have been made to the CVE-2025-0960 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]

CVE-2025-0630 – Western Telematic WTI LFI Vulnerability

The following table lists the changes that have been made to the CVE-2025-0630 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]

CVE-2025-0509 – Sparkle DSA Signing Bypass

The following table lists the changes that have been made to the CVE-2025-0509 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]

CVE-2025-25039 – Aruba Networking ClearPass Policy Manager Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-25039 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]

CVE-2025-24971 – DumpDrop OS Command Injection allows Remote Code Execution

The following table lists the changes that have been made to the CVE-2025-24971 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Feb. 04, 2025 Action Type […]

CVE-2025-24373 – Woocommerce PDF Invoices Packing Slips Unauthenticated Guest Document Link Hijacking

The following table lists the changes that have been made to the CVE-2025-24373 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]

CVE-2025-0445 – Google Chrome V8 Use-After-Free Heap Corruption Vulnerability

The following table lists the changes that have been made to the CVE-2025-0445 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]

CVE-2025-0444 – Google Chrome Skia Use After Free Vuln

The following table lists the changes that have been made to the CVE-2025-0444 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]

CVE-2025-0451 – Google Chrome Extensions API UI Spoofing

The following table lists the changes that have been made to the CVE-2025-0451 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]

CVE-2024-48019 – Apache Doris Path Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2024-48019 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]