CVE-2025-45949 – PHPGurukul User Registration & Login and User Management System Session Hijacking Vulnerability
The following table lists the changes that have been made to the CVE-2025-45949 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]
CVE-2025-45947 – PhpGurukul Online Banquet Booking System Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-45947 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]
CVE-2025-3224 – Docker Desktop for Windows Elevation of Privilege Vulnerability
A vulnerability in the update process of Docker Desktop for Windows versions prior to 4.41.0 could allow a local, low-privileged attacker to escalate privileges to SYSTEM. During an update, Docker Desktop attempts to delete files and subdirectories under the path C:ProgramDataDockerconfig with high privileges. However, this directory often does not exist by default, and C:ProgramData allows […]
CVE-2025-34491 – GFI MailEssentials .NET Deserialization Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-34491 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]
CVE-2025-31651 – Apache Tomcat Improper Neutralization of Escape, Meta, or Control Sequences
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. For a subset of unlikely rewrite rule configurations, it was possible for a specially crafted request to bypass some rewrite rules. If those rewrite rules effectively enforced security constraints, those constraints could be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.5, from […]
CVE-2025-31650 – Apache Tomcat HTTP Priority Header Memory Leak DoS
The following table lists the changes that have been made to the CVE-2025-31650 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]
CVE-2025-4033 – PHPGurukul Nipah Virus Testing Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-4033 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]
CVE-2025-4032 – InclusionAI AWorld Os Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-4032 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]
CVE-2025-34490 – GFI MailEssentials XXE Vulnerability
The following table lists the changes that have been made to the CVE-2025-34490 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]
CVE-2025-34489 – GFI MailEssentials Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-34489 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]