CVE-2025-46625 – Tenda RX2 Pro HTTPd Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-46625 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 01, 2025 Action […]
CVE-2025-46569 – Open Policy Agent (OPA) HTTP Data API Code Injection Vulnerability
Open Policy Agent (OPA) is an open source, general-purpose policy engine. Prior to version 1.4.0, when run as a server, OPA exposes an HTTP Data API for reading and writing documents. Requesting a virtual document through the Data API entails policy evaluation, where a Rego query containing a single data document reference is constructed from […]
CVE-2025-29763 – Apache HTTP Server Cross-Site Request Forgery
The following table lists the changes that have been made to the CVE-2025-29763 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] May. 01, 2025 Action Type […]
CVE-2025-4174 – PHPGurukul COVID19 Testing Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-4174 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 01, 2025 Action […]
CVE-2025-3517 – Devolutions Server PAM JIT Privilege Escalation
The following table lists the changes that have been made to the CVE-2025-3517 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 01, 2025 Action […]
CVE-2025-36558 – KUNBUS PiCtory Cross-Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2025-36558 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 01, 2025 Action […]
CVE-2025-36521 – MicroDicom DICOM Viewer Out-of-Bounds Read Vulnerability
The following table lists the changes that have been made to the CVE-2025-36521 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-35996 – KUNBUS PiCtory Stored Cross-Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2025-35996 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-35975 – MicroDicom DICOM Viewer Out-of-Bounds Write RCE
The following table lists the changes that have been made to the CVE-2025-35975 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-32011 – KUNBUS PiCtory Authentication Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-32011 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.