CVE-2025-4013 – PHPGurukul Art Gallery Management System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-4013 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]

CVE-2025-4012 – Playeduxyz PlayEdu SSRF Vulnerability

The following table lists the changes that have been made to the CVE-2025-4012 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]

CVE-2025-4011 – Redmine Custom Query Handler Cross Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-4011 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]

CVE-2025-42598 – Seiko Epson Printer DLL Hijacking Vulnerability

The following table lists the changes that have been made to the CVE-2025-42598 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]

CVE-2025-39367 – SeventhQueen Kleo Missing Authorization Vulnerability

The following table lists the changes that have been made to the CVE-2025-39367 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]

CVE-2025-32471 – Cisco ASA Unsalted Password Vulnerability

The following table lists the changes that have been made to the CVE-2025-32471 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]

CVE-2025-32470 – Apache HTTP Server DNS Spoofing

The following table lists the changes that have been made to the CVE-2025-32470 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]

CVE-2025-4007 – Tenda W12 and i24 HTTPd Stack-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-4007 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]

CVE-2025-22235 – Spring Security Endpoint Request Denial of Service (DoS)

The following table lists the changes that have been made to the CVE-2025-22235 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 28, 2025 Action […]

Fog Ransomware Directory With Active Directory Exploitation Tools & Scripts Uncovered

Fog Ransomware Directory With Active Directory Exploitation Tools & Scripts Uncovered Cybersecurity analysts have uncovered an open directory linked to the Fog ransomware group, revealing a comprehensive toolkit used by threat actors to compromise corporate networks. The directory, dis … Read more Published Date: Apr 28, 2025 (1 hour, 56 minutes ago) Vulnerabilities has been mentioned in […]