CVE-2025-26167 – Buffalo LS520D NAS Arbitrary File Read Vulnerability

The following table lists the changes that have been made to the CVE-2025-26167 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 06, 2025 Action […]

CVE-2025-25381 – KSRTC AWATAR Password Disclosure

The following table lists the changes that have been made to the CVE-2025-25381 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 06, 2025 Action […]

CVE-2025-25361 – PublicCMS Arbitrary Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-25361 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 06, 2025 Action […]

CVE-2025-25294 – Envoy Gateway JSON Log Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-25294 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 06, 2025 Action […]

CVE-2025-25191 – Group-Office Stored XSS Vulnerability

The following table lists the changes that have been made to the CVE-2025-25191 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 06, 2025 Action […]

CVE-2025-24796 – Collabora Online Macro Execution Privilege Escalation

Collabora Online is a collaborative online office suite based on LibreOffice. Macro support is disabled by default in Collabora Online, but can be enabled by an administrator. Collabora Online typically hosts each document instance within a jail and is allowed to download content from locations controlled by the net.lok_allow configuration option, which by default include […]

CVE-2025-2034 – PHPGurukul Pre-School Enrollment System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-2034 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 06, 2025 Action […]

CVE-2025-2035 – Apache Zend Hoster Ecommerce PHP Unrestricted File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2025-2035 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 06, 2025 Action […]

CVE-2024-52924 – Samsung Exynos Stack Out-of-Bounds Write Vulnerability

An issue was discovered in NRMM in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. Lack of boundary check during the decoding of Registration Accept messages can lead to out-of-bounds writes […]