CVE-2025-28402 – Ruyi Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-28402 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]

CVE-2025-28401 – “RUoYi Privilege Escalation Vulnerability”

The following table lists the changes that have been made to the CVE-2025-28401 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]

Food giant WK Kellogg discloses data breach linked to Clop ransomware

Food giant WK Kellogg discloses data breach linked to Clop ransomware US food giant WK Kellogg Co is warning employees and vendors that company data was stolen during the 2024 Cleo data theft attacks. Cleo software is a managed file transfer utility that was targeted by … Read more Published Date: Apr 07, 2025 (2 hours, […]

CVE-2025-3372 – PCMan FTP Server Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-3372 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]

CVE-2025-3371 – PCMan FTP Server Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-3371 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]

CVE-2025-3248 – Langflow Code Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-3248 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]

CVE-2025-32014 – Estree-util-value-to-estree Prototype Pollution

The following table lists the changes that have been made to the CVE-2025-32014 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]

CVE-2025-31476 – Tarteaucitron.js JavaScript URL Scheme Injection

tarteaucitron.js is a compliant and accessible cookie banner. A vulnerability was identified in tarteaucitron.js, allowing a user with high privileges (access to the site’s source code or a CMS plugin) to enter a URL containing an insecure scheme such as javascript:alert(). Before the fix, URL validation was insufficient, which could allow arbitrary JavaScript execution if […]

CVE-2025-31475 – “Tarteaucitron.js Prototype Pollution Vulnerability”

tarteaucitron.js is a compliant and accessible cookie banner. A vulnerability was identified in tarteaucitron.js prior to 1.20.1, where the addOrUpdate function, used for applying custom texts, did not properly validate input. This allowed an attacker with direct access to the site’s source code or a CMS plugin to manipulate JavaScript object prototypes, leading to potential […]

CVE-2025-31138 – Tarteaucitron.js Clickjacking Vulnerability

The following table lists the changes that have been made to the CVE-2025-31138 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]