CVE-2025-30712 – Oracle VM VirtualBox Core Unauthorized Access and Data Manipulation Vulnerability
The following table lists the changes that have been made to the CVE-2025-30712 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
CVE-2025-30511 – Apache Struts Stored Cross-Site Scripting
The following table lists the changes that have been made to the CVE-2025-30511 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
Max Severity Bug in Apache Roller Enabled Persistent Access
Max Severity Bug in Apache Roller Enabled Persistent Access Source: Piotr Swat va ShutterstockThe maintainers of the Apache Roller open source blogging platform patched a maximum severity bug that allowed continued access to the app even after a user changed t … Read more Published Date: Apr 15, 2025 (2 hours, 10 minutes ago) Vulnerabilities has been […]
CVE-2025-32445 – Argo Events Privileged Access Escalation
Argo Events is an event-driven workflow automation framework for Kubernetes. A user with permission to create/modify EventSource and Sensor custom resources can gain privileged access to the host system and cluster, even without having direct administrative privileges. The EventSource and Sensor CRs allow the corresponding orchestrated pod to be customized with spec.template and spec.template.container (with […]
CVE-2025-32438 – NixOS systemd.shutdownRamfs Privilege Escalation
The following table lists the changes that have been made to the CVE-2025-32438 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]
CVE-2025-32012 – Jellyfin Unauthenticated Local Network IP Spoofing Denial of Service
Jellyfin is an open source self hosted media server. In versions 10.9.0 to before 10.10.7, the /System/Restart endpoint provides administrators the ability to restart their Jellyfin server. This endpoint is intended to be admins-only, but it also authorizes requests from any device in the same local network as the Jellyfin server. Due to the method […]
CVE-2025-31497 – TEIGarage XXE Injection Vulnerability
TEIGarage is a webservice and RESTful service to transform, convert and validate various formats, focussing on the TEI format. The Document Conversion Service contains a critical XML External Entity (XXE) Injection vulnerability in its document conversion functionality. The service processes XML files during the conversion process but fails to disable external entity processing, allowing an […]
CVE-2025-32439 – Deezer Connect Pleezer Zombie Process Creation Vulnerability
pleezer is a headless Deezer Connect player. Hook scripts in pleezer can be triggered by various events like track changes and playback state changes. In versions before 0.16.0, these scripts were spawned without proper process cleanup, leaving zombie processes in the system’s process table. Even during normal usage, every track change and playback event would […]
CVE-2025-30206 – Dpanel Hardcoded JWT Secret Remote Code Execution Vulnerability
Dpanel is a Docker visualization panel system which provides complete Docker management functions. The Dpanel service contains a hardcoded JWT secret in its default configuration, allowing attackers to generate valid JWT tokens and compromise the host machine. This security flaw allows attackers to analyze the source code, discover the embedded secret, and craft legitimate JWT […]
CVE-2025-2567 – “Rockwell Automation Fuel Monitoring System Configuration Vulnerability”
The following table lists the changes that have been made to the CVE-2025-2567 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 15, 2025 Action […]