CVE-2025-2233 – Samsung SmartThings Cryptographic Signature Authentication Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-2233 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1707 – WordPress Review Schema Plugin Local File Inclusion Vulnerability
The Review Schema plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.2.4 via post meta. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This […]
CVE-2025-28915 – ThemeEgg Toolkit Unrestricted File Upload RCE
The following table lists the changes that have been made to the CVE-2025-28915 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-25928 – Openmrs CSRF Vulnerability
The following table lists the changes that have been made to the CVE-2025-25928 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27773 – SimpleSAMLphp SAML2 Signature Confusion Attack
The following table lists the changes that have been made to the CVE-2025-27773 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 11, 2025 Action […]
CVE-2025-27591 – Below Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-27591 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 11, 2025 Action […]
CVE-2025-27440 – Zoom Workplace Apps Heap Overflow Privilege Escalation
The following table lists the changes that have been made to the CVE-2025-27440 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 11, 2025 Action […]
CVE-2025-27439 – Zoom Workplace Apps Buffer Underflow Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-27439 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 11, 2025 Action […]
CVE-2025-27179 – Adobe InDesign NULL Pointer Dereference Denial-of-Service Vulnerability
The following table lists the changes that have been made to the CVE-2025-27179 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 11, 2025 Action […]
CVE-2025-27178 – Adobe InDesign Out-of-Bounds Write Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-27178 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 11, 2025 Action […]