CVE-2025-2496 – Apache Struts Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-2496 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Mar. 26, 2025 Action Type […]

CVE-2025-30407 – Acronis Cyber Protect Cloud Agent Binary Hijacking Vulnerability

The following table lists the changes that have been made to the CVE-2025-30407 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]

CVE-2025-2838 – Silicon Labs Gecko OS DNS Response Processing Denial-of-Service Vulnerability

The following table lists the changes that have been made to the CVE-2025-2838 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]

CVE-2025-2837 – Silicon Labs Gecko OS HTTP Request Handling Stack-based Buffer Overflow Remote Code Execution

The following table lists the changes that have been made to the CVE-2025-2837 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]

CVE-2025-20233 – Splunk App for Lookup File Editing Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-20233 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]

CVE-2025-20232 – Splunk Enterprise/Bypass Splunk Search Command Permissions

In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.3.2408.103, 9.2.2406.108, 9.2.2403.113, 9.1.2312.208 and 9.1.2308.212, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a saved search with a risky command using the permissions of a higher-privileged user to bypass the SPL safeguards […]

CVE-2025-20229 – Splunk Enterprise/Cloud Platform Remote Code Execution Vulnerability

In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.104, 9.2.2406.108, 9.2.2403.114, and 9.1.2312.208, a low-privileged user that does not hold the “admin” or “power” Splunk roles could perform a Remote Code Execution (RCE) through a file upload to the “$SPLUNK_HOME/var/run/splunk/apptemp” directory due to missing authorization checks.

CVE-2025-20228 – Splunk Enterprise Cross-Site Request Forgery (CSRF) Vulnerability

The following table lists the changes that have been made to the CVE-2025-20228 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]