CVE-2025-29312 – “Onos Legacy Switch Link Type Manipulation Vulnerability”

The following table lists the changes that have been made to the CVE-2025-29312 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 24, 2025 Action […]

CVE-2025-29311 – Onos Private Key Disclosure via LLDP Brute Force

The following table lists the changes that have been made to the CVE-2025-29311 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 24, 2025 Action […]

CVE-2025-29100 – Tenda AC8 Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-29100 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 24, 2025 Action […]

CVE-2025-29310 – Onos LLDP Deserialization Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-29310 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 24, 2025 Action […]

CVE-2025-29135 – Tenda AC7 Stack-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-29135 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 24, 2025 Action […]

CVE-2025-2709 – Yonyou UFIDA ERP-NC Cross Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-2709 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 24, 2025 Action […]

CVE-2025-2231 – PDF-XChange Editor RTF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-2231 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 24, 2025 Action […]

CVE-2025-2708 – Zhijiantianya Ruoyi-Vue-Pro Backend File Upload Interface Remote Path Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2025-2708 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 24, 2025 Action […]

CVE-2025-30163 – Cilium Node Label Policy Bypass

The following table lists the changes that have been made to the CVE-2025-30163 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 24, 2025 Action […]

CVE-2025-30162 – Cilium Incorrect Egress Traffic Policy Enforcement

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. For Cilium users who use Gateway API for Ingress for some services and use LB-IPAM or BGP for LB Service implementation and use network policies to block egress traffic from workloads in a namespace to workloads in other namespaces, egress traffic from workloads […]