CVE-2025-46656 – Markdownify Headline Prefix Overflow
The following table lists the changes that have been made to the CVE-2025-46656 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 26, 2025 Action […]
CVE-2025-3954 – ChurchCRM Referer Handler Server-Side Request Forgery Vulnerability
The following table lists the changes that have been made to the CVE-2025-3954 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 26, 2025 Action […]
CVE-2025-46654 – CodiMD through 2.2.0 has a CSP-based protection me
The following table lists the changes that have been made to the CVE-2025-46654 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 26, 2025 Action […]
CVE-2025-46655 – CodiMD AWS S3 SVG XSS Bypass
The following table lists the changes that have been made to the CVE-2025-46655 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 26, 2025 Action […]
CVE-2025-46653 – Formidable File Name Guessing Vulnerability
Formidable (aka node-formidable) 2.1.0 through 3.x before 3.5.3 relies on hexoid to prevent guessing of filenames for untrusted executable content; however, hexoid is documented as not “cryptographically secure.” (Also, there is a scenario in which only the last two characters of a hexoid string need to be guessed, but this is not often relevant.) NOTE: […]
CVE-2025-46652 – IZArc Mark-of-the-Web Bypass Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2025-46652 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 26, 2025 Action […]
CVE-2025-46646 – Ghostscript UTF-8 Encoding Vulnerability
The following table lists the changes that have been made to the CVE-2025-46646 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 26, 2025 Action […]
CVE-2024-53636 – Serosoft Academia Student Information System (SIS) EagleR File Upload Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2024-53636 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 26, 2025 Action […]
Planet Technology Industrial Switch Flaws Risk Full Takeover – Patch Now
Planet Technology Industrial Switch Flaws Risk Full Takeover – Patch Now Immersive security researchers discovered critical vulnerabilities in Planet Technology network management and switch products, allowing full device control. Learn about the flaws, affected models and … Read more Published Date: Apr 26, 2025 (1 hour, 23 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-46275 […]
SAP NetWeaver Flaw Scores 10.0 Severity as Hackers Deploy Web Shells
SAP NetWeaver Flaw Scores 10.0 Severity as Hackers Deploy Web Shells A critical vulnerability (CVE-2025-31324) in SAP NetWeaver Visual Composer puts systems at risk of full compromise. Learn how to check if your SAP Java systems are affected and the immediate steps to … Read more Published Date: Apr 26, 2025 (2 hours, 24 minutes ago) Vulnerabilities […]