CVE-2025-30212 – Frappe Framework SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-30212 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]

CVE-2025-2532 – Luxion KeyShot USDC File Parsing Use-After-Free Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-2532 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]

CVE-2025-2531 – Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution

The following table lists the changes that have been made to the CVE-2025-2531 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]

CVE-2025-2530 – Luxion KeyShot DAE File Parsing Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-2530 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]

CVE-2025-27147 – GLPI Inventory Plugin Unauthenticated Remote Code Execution

The GLPI Inventory Plugin handles various types of tasks for GLPI agents, including network discovery and inventory (SNMP), software deployment, VMWare ESX host remote inventory, and data collection (files, Windows registry, WMI). Versions prior to 1.5.0 have an improper access control vulnerability. Version 1.5.0 fixes the vulnerability.

CVE-2025-26742 – GhozyLab Gallery for Social Photo Stored Cross-site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-26742 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]

CVE-2024-55604 – Appsmith Information Disclosure Vulnerability

Appsmith is a platform to build admin panels, internal tools, and dashboards. Users invited as “App Viewer” should not have access to development information of a workspace. Datasources are such a component in a workspace. Yet, in versions of Appsmith prior to 1.51, app viewers are able to get a list of datasources in a […]

CVE-2025-30091 – MoxieManager Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-30091 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]

CVE-2025-29635 – D-Link DIR-823X Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-29635 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]

CVE-2025-22230 – VMware Tools for Windows Authentication Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-22230 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]