CVE-2025-1359 – SIAM Industria de Automação e Monitoramento SIAM 2.0 Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-1359 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 16, 2025 Action […]
CVE-2025-1358 – Pix Software Vivaz Cross-Site Request Forgery Vulnerability
The following table lists the changes that have been made to the CVE-2025-1358 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 16, 2025 Action […]
CVE-2025-1357 – Seventh D-Guard HTTP GET Request Handler Path Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-1357 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 16, 2025 Action […]
CVE-2025-1356 – Needyamin Library Card System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-1356 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 16, 2025 Action […]
CVE-2025-1355 – Needyamin Library Card System Unrestricted File Upload Vulnerability
The following table lists the changes that have been made to the CVE-2025-1355 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 16, 2025 Action […]
CVE-2025-1354 – Asus RT-N12E Cross Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-1354 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 16, 2025 Action […]
CVE-2025-1352 – “GNU elfutils Remote Memory Corruption”
The following table lists the changes that have been made to the CVE-2025-1352 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 16, 2025 Action […]
CVE-2025-1353 – Kong Insomnia DLL Search Path Manipulation Vulnerability
The following table lists the changes that have been made to the CVE-2025-1353 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 16, 2025 Action […]
CVE-2025-1341 – PMWeb Weak Password Requirements Remote Vulnerability
The following table lists the changes that have been made to the CVE-2025-1341 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 16, 2025 Action […]
CVE-2025-1340 – TOTOLINK X18 Stack-Based Buffer Overflow Remote Vulnerability
The following table lists the changes that have been made to the CVE-2025-1340 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 16, 2025 Action […]