CVE-2025-31119 – JHipster Entity Audit Remote Code Execution (RCE)
The following table lists the changes that have been made to the CVE-2025-31119 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 03, 2025 Action […]
CVE-2025-31485 – API Platform Core GraphQL Cache Key Tampering Vulnerability
The following table lists the changes that have been made to the CVE-2025-31485 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 03, 2025 Action […]
CVE-2025-31481 – API Platform Core Relay Security Bypass
The following table lists the changes that have been made to the CVE-2025-31481 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 03, 2025 Action […]
CVE-2025-31161 – CrushFTP Unauthenticated HTTP(S) Port Access and Authentication Bypass
CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and takeover of the crushadmin account (unless a DMZ proxy instance is used), as exploited in the wild in March and April 2025, aka “Unauthenticated HTTP(S) port access.” A race condition exists in the AWS4-HMAC (compatible with S3) authorization method of the HTTP component […]
CVE-2025-30406 – Gladinet CentreStack Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-30406 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 03, 2025 Action […]
CVE-2025-29570 – Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-29570 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 03, 2025 Action […]
CVE-2025-29504 – Student-Manage Apache Privilege Escalation
The following table lists the changes that have been made to the CVE-2025-29504 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 03, 2025 Action […]
CVE-2025-29462 – Tenda Ac15 Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-29462 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 03, 2025 Action […]
CVE-2025-29064 – TOTOLINK x18 Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-29064 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 03, 2025 Action […]
CVE-2025-26818 – Netwrix Password Secure Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-26818 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 03, 2025 Action […]