CVE-2025-2601 – SourceCodester Kortex Lite Advocate Office Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-2601 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 21, 2025 Action […]
CVE-2025-25036 – Jalios JPlatform XML External Entity Reference Vulnerability
The following table lists the changes that have been made to the CVE-2025-25036 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 21, 2025 Action […]
CVE-2025-25035 – Jalios JPlatform Cross-site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation Cross-site Scripting vulnerability in Jalios JPlatform 10 allows for Reflected XSS and Stored XSS.This issue affects JPlatform 10: before 10.0.8 (SP8), before 10.0.7 (SP7), before 10.0.6 (SP6) and Jalios Workplace 6.2, Jalios Workplace 6.1, Jalios Workplace 6.0, and Jalios Workplace 5.3 to 5.5
CVE-2025-30349 – Horde IMP Cross-Site Scripting (XSS) Vulnerability
The following table lists the changes that have been made to the CVE-2025-30349 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 21, 2025 Action […]
CVE-2025-29226 – Linksys E5600 Lua Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-29226 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 21, 2025 Action […]
CVE-2025-29227 – Linksys E5600 Remote Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-29227 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Mar. 21, 2025 Action Type […]
CVE-2025-29223 – Linksys E5600 Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-29223 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Mar. 21, 2025 Action Type […]
CVE-2025-29230 – Linksys E5600 Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-29230 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Mar. 21, 2025 Action Type […]
CVE-2024-53351 – Pipecd Authorization Bypass
The following table lists the changes that have been made to the CVE-2024-53351 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 21, 2025 Action […]
CVE-2024-53350 – Kubeslice Service Account Token Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2024-53350 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 21, 2025 Action […]