CVE-2025-0593 – Cisco Router Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-0593 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 14, 2025 Action […]
CVE-2025-0592 – Apache IoT Shell Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-0592 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 14, 2025 Action […]
CVE-2024-31144 – Xen API Metadata Backup Spoofing Vulnerability
For a brief summary of Xapi terminology, see: https://xapi-project.github.io/xen-api/overview.html#object-model-overview Xapi contains functionality to backup and restore metadata about Virtual Machines and Storage Repositories (SRs). The metadata itself is stored in a Virtual Disk Image (VDI) inside an SR. This is used for two purposes; a general backup of metadata (e.g. to recover from a host […]
CVE-2022-28693 – Intel Processors Alternative Channel Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2022-28693 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 14, 2025 Action […]
CVE-2022-26083 – Intel IPP Cryptography Weak Initialization Vector Information Disclosure
The following table lists the changes that have been made to the CVE-2022-26083 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 14, 2025 Action […]
CVE-2025-25304 – Vega Cross-Site Scripting Vulnerability
Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. Prior to version 5.26.0 of vega and 5.4.2 of vega-selections, the `vlSelectionTuples` function can be used to call JavaScript functions, leading to cross-site scripting.`vlSelectionTuples` calls multiple functions that can be controlled by an attacker, including one call with an […]
CVE-2025-25297 – Label Studio SSRF Vulnerability
Label Studio is an open source data labeling tool. Prior to version 1.16.0, Label Studio’s S3 storage integration feature contains a Server-Side Request Forgery (SSRF) vulnerability in its endpoint configuration. When creating an S3 storage connection, the application allows users to specify a custom S3 endpoint URL via the s3_endpoint parameter. This endpoint URL is […]
CVE-2025-25296 – Label Studio Cross-Site Scripting (XSS) Vulnerability
Label Studio is an open source data labeling tool. Prior to version 1.16.0, Label Studio’s `/projects/upload-example` endpoint allows injection of arbitrary HTML through a `GET` request with an appropriately crafted `label_config` query parameter. By crafting a specially formatted XML label config with inline task data containing malicious HTML/JavaScript, an attacker can achieve Cross-Site Scripting (XSS). […]
CVE-2025-25290 – GitHub Octokit Regular Expression Denial of Service (ReDoS)
The following table lists the changes that have been made to the CVE-2025-25290 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 14, 2025 Action […]
CVE-2025-25289 – Octokit Regular Expression Denial of Service (ReDoS) Vulnerability
The following table lists the changes that have been made to the CVE-2025-25289 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 14, 2025 Action […]