CVE-2025-2559 – Keycloak JWT Token Cache Denial of Service Vulnerability
A flaw was found in Keycloak. When the configuration uses JWT tokens for authentication, the tokens are cached until expiration. If a client uses JWT tokens with an excessively long expiration time, for example, 24 or 48 hours, the cache can grow indefinitely, leading to an OutOfMemoryError. This issue could result in a denial of […]
CVE-2025-2510 – WordPress Frndzk Expandable Bottom Bar Stored Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-2510 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]
CVE-2025-2319 – WordPress EZ SQL Reports Cross-Site Request Forgery
The following table lists the changes that have been made to the CVE-2025-2319 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]
CVE-2024-13731 – WordPress Alert Box Block Stored Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2024-13731 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]
CVE-2024-13710 – Estatebud Properties & Listings Cross-Site Request Forgery
The following table lists the changes that have been made to the CVE-2024-13710 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]
CVE-2024-13690 – WordPress WP Church Donation Stored Cross-Site Scripting
The following table lists the changes that have been made to the CVE-2024-13690 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]
CVE-2025-2751 – Open Asset Import Library Assimp CSM File Handler Out-of-Bounds Read Vulnerability
The following table lists the changes that have been made to the CVE-2025-2751 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]
CVE-2025-2752 – “Assimp CSM File Handler Out-of-Bounds Read Vulnerability”
The following table lists the changes that have been made to the CVE-2025-2752 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]
CVE-2025-2750 – Assimp CSM File Handler Out-of-Bounds Write Vulnerability
The following table lists the changes that have been made to the CVE-2025-2750 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]
CVE-2025-2744 – “Zhijiantianya Ruoyi-vue-pro Remote Path Traversal Vulnerability”
The following table lists the changes that have been made to the CVE-2025-2744 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 25, 2025 Action […]