CVE-2025-3398 – Lenve VBlog Remote Web Security Config File Improper Access Controls Vulnerability

The following table lists the changes that have been made to the CVE-2025-3398 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-3397 – YzmCMS Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-3397 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-3393 – MRCEN Springboot-Ucan-Admin Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-3393 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-3392 – “Hailey888 OA System Backend MailController Cross-Site Scripting Vulnerability”

The following table lists the changes that have been made to the CVE-2025-3392 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-3363 – HGiga iSherlock OS Command Injection

The following table lists the changes that have been made to the CVE-2025-3363 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-3362 – HGiga iSherlock OS Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-3362 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-3361 – HGiga iSherlock OS Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-3361 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-2526 – Streamit Theme for WordPress Privilege Escalation via Account Takeover

The following table lists the changes that have been made to the CVE-2025-2526 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-2525 – Streamit for WordPress Arbitrary File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2025-2525 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-2519 – Sreamit WordPress Arbitrary File Download Vulnerability

The following table lists the changes that have been made to the CVE-2025-2519 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]