CVE-2025-25957 – Xunruicms Cross Site Scripting Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-25957 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]

CVE-2025-25679 – Tenda i12 Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-25679 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]

CVE-2025-25678 – Tenda i12 Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-25678 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]

CVE-2025-27088 – AWS S3 Proxy – Reflected Cross-site Scripting (XSS) in oxyno-zeta

oxyno-zeta/s3-proxy is an aws s3 proxy written in go. In affected versions a Reflected Cross-site Scripting (XSS) vulnerability enables attackers to create malicious URLs that, when visited, inject scripts into the web application. This can lead to session hijacking or phishing attacks on a trusted domain, posing a moderate risk to all users. It’s possible […]

CVE-2025-25662 – Tenda O4 Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-25662 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]

CVE-2025-22973 – QiboSoft QiboCMS Information Disclosure

The following table lists the changes that have been made to the CVE-2025-22973 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]

CVE-2025-25676 – Tenda i12 Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-25676 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]

CVE-2025-25675 – Tenda AC10 Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-25675 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]

CVE-2025-25674 – Tenda AC10 Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-25674 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]

CVE-2025-25668 – Tenda AC8V4 Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-25668 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 20, 2025 Action […]