CVE-2025-1202 – SourceCodester Best Church Management Software SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-1202 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]
CVE-2025-1042 – GitLab EE Insecure Direct Object Reference
The following table lists the changes that have been made to the CVE-2025-1042 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]
CVE-2024-54160 – OpenSearch Cross-Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2024-54160 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]
CVE-2025-0376 – GitLab CE/EE Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-0376 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]
CVE-2024-12379 – GitLab Denial of Service (DoS) Vulnerability
The following table lists the changes that have been made to the CVE-2024-12379 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]
CVE-2024-12251 – Telerik UI for WinUI Command Injection Vulnerability
CVE ID : CVE-2024-12251 Published : Feb. 12, 2025, 3:15 p.m. | 1 hour ago Description : In Progress® Telerik® UI for WinUI versions prior to 2025 Q1 (3.0.0), a command injection attack is possible through improper neutralization of hyperlink elements. Severity: 7.8 | HIGH Visit the link for more details, such as CVSS details, affected […]
CVE-2025-26378 – Q-Free MaxTime Missing Authorization Vulnerability
The following table lists the changes that have been made to the CVE-2025-26378 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-26377 – Q-Free MaxTime Missing Authorization Vulnerability
The following table lists the changes that have been made to the CVE-2025-26377 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-26375 – Q-Free MaxTime Missing Authorization Vulnerability
The following table lists the changes that have been made to the CVE-2025-26375 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-26376 – Q-Free MaxTime Missing Authorization Vulnerability
The following table lists the changes that have been made to the CVE-2025-26376 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]