CVE-2025-27719 – Cisco Device Information Disclosure
The following table lists the changes that have been made to the CVE-2025-27719 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
CVE-2025-27575 – “EV Charger Firmware Disclosure Vulnerability”
The following table lists the changes that have been made to the CVE-2025-27575 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
CVE-2025-27565 – Vulnerability Title: “Cisco Room Deletion”
The following table lists the changes that have been made to the CVE-2025-27565 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
CVE-2025-27561 – “Apache CouchDB Room Renaming Vulnerability”
The following table lists the changes that have been made to the CVE-2025-27561 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
CVE-2025-27011 – Magepeopleteam Booking and Rental Manager PHP Remote File Inclusion Vulnerability
The following table lists the changes that have been made to the CVE-2025-27011 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
CVE-2025-26927 – EPC AI Hub Unrestricted File Upload Vulnerability
The following table lists the changes that have been made to the CVE-2025-26927 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
CVE-2025-26748 – LOOS,Inc. Arkhe CSRF Remote Code Execution
The following table lists the changes that have been made to the CVE-2025-26748 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
CVE-2025-24297 – Apache Web Portal Cross-Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2025-24297 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
CVE-2025-30735 – Oracle PeopleSoft PeopleSoft Enterprise CC Common Application Objects HTTP Unauthorized Access Vulnerability
The following table lists the changes that have been made to the CVE-2025-30735 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
CVE-2025-30727 – Oracle E-Business Suite iSurvey Module Remote Takeover Vulnerability
The following table lists the changes that have been made to the CVE-2025-30727 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]