CVE-2025-2198 – CVE-2020-13143 Apache Struts Command Injection
The following table lists the changes that have been made to the CVE-2025-2198 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Mar. 20, 2025 Action Type […]
CVE-2025-30334 – OpenBSD wg(4) Kernel Crash Vulnerability
The following table lists the changes that have been made to the CVE-2025-30334 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 9119a7d8-5eab-497f-8521-727c672e3725 Mar. 20, 2025 Action Type […]
CVE-2025-2538 – Esri ArcGIS Enterprise Portal Password Recovery Exploitation Vulnerability
The following table lists the changes that have been made to the CVE-2025-2538 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 20, 2025 Action […]
CVE-2025-2574 – Xpdf Out-of-bounds Array Write Vulnerability
The following table lists the changes that have been made to the CVE-2025-2574 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 20, 2025 Action […]
CVE-2025-25758 – KukuFM Android Backup Data Exposure
The following table lists the changes that have been made to the CVE-2025-25758 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 20, 2025 Action […]
CVE-2025-26852 – DESCOR InfoCad SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-26852 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 20, 2025 Action […]
CVE-2025-26853 – DESCOR InfoCAD Authentication Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-26853 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 20, 2025 Action […]
CVE-2025-30160 – Redlib DEFLATE Decompression Bomb Denial-of-Service Vulnerability
The following table lists the changes that have been made to the CVE-2025-30160 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 20, 2025 Action […]
CVE-2025-2557 – “Audi UTR Dashcam 2.0 Command API Local Network Access Control Vulnerability”
The following table lists the changes that have been made to the CVE-2025-2557 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 20, 2025 Action […]
CVE-2025-29980 – eTRAKiT.net SQL Injection Vulnerability
CVE ID : CVE-2025-29980 Published : March 20, 2025, 7:15 p.m. | 1 hour, 27 minutes ago Description : A SQL injection issue has been discovered in eTRAKiT.net release 3.2.1.77. Due to improper input validation, a remote unauthenticated attacker can run arbitrary commands as the current MS SQL server account. It is recommended that the CRM feature […]