CVE-2025-2601 – SourceCodester Kortex Lite Advocate Office Management System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-2601 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 21, 2025 Action […]

CVE-2025-25036 – Jalios JPlatform XML External Entity Reference Vulnerability

The following table lists the changes that have been made to the CVE-2025-25036 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 21, 2025 Action […]

CVE-2025-25035 – Jalios JPlatform Cross-site Scripting (XSS)

Improper Neutralization of Input During Web Page Generation Cross-site Scripting vulnerability in Jalios JPlatform 10 allows for Reflected XSS and Stored XSS.This issue affects JPlatform 10: before 10.0.8 (SP8), before 10.0.7 (SP7), before 10.0.6 (SP6) and Jalios Workplace 6.2, Jalios Workplace 6.1, Jalios Workplace 6.0, and Jalios Workplace 5.3 to 5.5

CVE-2025-30349 – Horde IMP Cross-Site Scripting (XSS) Vulnerability

The following table lists the changes that have been made to the CVE-2025-30349 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 21, 2025 Action […]

CVE-2025-29226 – Linksys E5600 Lua Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-29226 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 21, 2025 Action […]

CVE-2025-29227 – Linksys E5600 Remote Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-29227 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Mar. 21, 2025 Action Type […]

CVE-2025-29223 – Linksys E5600 Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-29223 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Mar. 21, 2025 Action Type […]

CVE-2025-29230 – Linksys E5600 Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-29230 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Mar. 21, 2025 Action Type […]

CVE-2024-53351 – Pipecd Authorization Bypass

The following table lists the changes that have been made to the CVE-2024-53351 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 21, 2025 Action […]

CVE-2024-53350 – Kubeslice Service Account Token Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2024-53350 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 21, 2025 Action […]