CVE-2025-24522 – KUNBUS Revolution Pi Node-RED Remote Command Execution

The following table lists the changes that have been made to the CVE-2025-24522 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-46567 – LLaMA Factory Deserialization Command Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-46567 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 01, 2025 Action […]

CVE-2025-46568 – Stirling-PDF SSRF-Induced Arbitrary File Read Vulnerability

Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. Prior to version 0.45.0, Stirling-PDF is vulnerable to SSRF-induced arbitrary file read. WeasyPrint redefines a set of HTML tags, including img, embed, object, and others. The references to several files inside, allow the attachment of content from any […]

CVE-2025-46566 – DataEase Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-46566 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 01, 2025 Action […]

CVE-2025-46565 – Vite File Pattern Denial of Service

Vite is a frontend tooling framework for javascript. Prior to versions 6.3.4, 6.2.7, 6.1.6, 5.4.19, and 4.5.14, the contents of files in the project root that are denied by a file matching pattern can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using –host or server.host config […]

CVE-2025-46345 – Auth0 Account Link Extension JWT Signature Verification Bypass

The following table lists the changes that have been made to the CVE-2025-46345 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 01, 2025 Action […]

CVE-2025-46337 – ADOdb PostgreSQL SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-46337 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 01, 2025 Action […]

CVE-2025-44867 – Tenda W20E Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-44867 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 01, 2025 Action […]

CVE-2025-44866 – Tenda W20E Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-44866 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 01, 2025 Action […]

CVE-2025-44865 – Tenda W20E Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-44865 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 01, 2025 Action […]