CVE-2025-46815 – ZITADEL IdP Intent Session Token Abuse

The identity infrastructure software ZITADEL offers developers the ability to manage user sessions using the Session API. This API enables the use of IdPs for authentication, known as idp intents. Following a successful idp intent, the client receives an id and token on a predefined URI. These id and token can then be used to […]

CVE-2025-44900 – Tenda RX3 Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-44900 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-37730 – Logstash SSL Verification MitM Vulnerability

The following table lists the changes that have been made to the CVE-2025-37730 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-25014 – Kibana Prototype Pollution Remote Code Execution

The following table lists the changes that have been made to the CVE-2025-25014 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-4041 – Optigo Networks ONS NC600 Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-4041 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-46735 – Terraform WinDNS Provider Authenticated Command Injection

The following table lists the changes that have been made to the CVE-2025-46735 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-45250 – MrDoc SSRF Vulnerability

The following table lists the changes that have been made to the CVE-2025-45250 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-46736 – Umbraco Account Existence Disclosure

The following table lists the changes that have been made to the CVE-2025-46736 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-32022 – Finit Urandom Heap Buffer Overwrite Vulnerability

The following table lists the changes that have been made to the CVE-2025-32022 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-30165 – vLLM ZeroMQ Remote Code Execution Vulnerability

vLLM is an inference and serving engine for large language models. In a multi-node vLLM deployment using the V0 engine, vLLM uses ZeroMQ for some multi-node communication purposes. The secondary vLLM hosts open a `SUB` ZeroMQ socket and connect to an `XPUB` socket on the primary vLLM host. When data is received on this `SUB` […]