CVE-2025-2499 – Devolutions Remote Desktop Manager Windows Client-Side Access Control Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-2499 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]

CVE-2024-41643 – Arris NVG443B Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2024-41643 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]

CVE-2025-30350 – Directus S3 Storage Driver HEAD Flood Denial of Assets

Directus is a real-time API and App dashboard for managing SQL database content. The `@directus/storage-driver-s3` package starting in version 9.22.0 and prior to version 12.0.1, corresponding to Directus starting in version 9.22.0 and prior to 11.5.0, is vulnerable to asset unavailability after a burst of HEAD requests. Some tools use Directus to sync content and […]

CVE-2025-30225 – Directus S3 Storage Driver Asset Unavailability Denial of Service

Directus is a real-time API and App dashboard for managing SQL database content. The `@directus/storage-driver-s3` package starting in version 9.22.0 and prior to version 12.0.1, corresponding to Directus starting in version 9.22.0 and prior to 11.5.0, is vulnerable to asset unavailability after a burst of malformed transformations. When making many malformed transformation requests at once, […]

CVE-2025-30217 – Frappe SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-30217 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]

CVE-2025-30164 – Icinga Web 2 Cross-Site Request Forgery (CSRF) Vulnerability

The following table lists the changes that have been made to the CVE-2025-30164 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]

CVE-2025-27609 – Icinga Web 2 Cross-Site Scripting (XSS)

The following table lists the changes that have been made to the CVE-2025-27609 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]

Next.js Middleware Flaw Lets Attackers Bypass Authorization

Next.js Middleware Flaw Lets Attackers Bypass Authorization A recent collaborative effort by researchers Rachid Allam and Yasser Allam has exposed a critical vulnerability within the Next.js framework, a widely used JavaScript framework based on React with nea … Read more Published Date: Mar 26, 2025 (2 hours, 31 minutes ago) Vulnerabilities has been mentioned in this article. […]

CVE-2025-2825 – CrushFTP Unauthenticated Remote Access Vulnerability

The following table lists the changes that have been made to the CVE-2025-2825 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]

CVE-2025-2098 – Fast CAD Reader Dylib Hijacking Vulnerability

The following table lists the changes that have been made to the CVE-2025-2098 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]