CVE-2025-2917 – ChestnutCMS Remote Path Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2025-2917 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 28, 2025 Action […]

CVE-2025-2916 – “Aishida Call Center System Command Injection Vulnerability”

The following table lists the changes that have been made to the CVE-2025-2916 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 28, 2025 Action […]

CVE-2025-2915 – HDF5 Heap-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-2915 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Mar. 28, 2025 Action Type […]

CVE-2025-2914 – HDF5 Heap-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-2914 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 28, 2025 Action […]

CVE-2025-2913 – HDF5 Use After Free Local Vulnerability

The following table lists the changes that have been made to the CVE-2025-2913 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 28, 2025 Action […]

CVE-2025-2713 – Google gVisor’s runsc Local Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-2713 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 28, 2025 Action […]

CVE-2025-2912 – HDF5 Heap-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-2912 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 28, 2025 Action […]

CVE-2025-31010 – ReichertBrothers SimplyRETS Real Estate IDX CSRF

The following table lists the changes that have been made to the CVE-2025-31010 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 28, 2025 Action […]

CVE-2025-30372 – Emlog Pro SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-30372 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Mar. 28, 2025 Action Type […]

CVE-2025-30371 – Metabase GeoJson Endpoint Local Link Access Protection Bypass

Metabase is a business intelligence and embedded analytics tool. Versions prior to v0.52.16.4, v1.52.16.4, v0.53.8, and v1.53.8 are vulnerable to circumvention of local link access protection in GeoJson endpoint. Self hosted Metabase instances that are using the GeoJson feature could be potentially impacted if their Metabase is colocated with other unsecured resources. This is fixed […]