CVE-2025-1331 – IBM CICS TX Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-1331 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]

CVE-2025-1330 – IBM CICS TX DNS Code Injection

The following table lists the changes that have been made to the CVE-2025-1330 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]

CVE-2025-1329 – IBM CICS TX DNS Rebinding Vulnerability

The following table lists the changes that have been made to the CVE-2025-1329 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]

CVE-2025-28074 – phpList XSS Injection

The following table lists the changes that have been made to the CVE-2025-28074 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]

CVE-2023-31585 – Grocery-CMS-PHP Unauthenticated File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2023-31585 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]

Cisco fixes max severity IOS XE flaw letting attackers hijack devices

Cisco fixes max severity IOS XE flaw letting attackers hijack devices Cisco has fixed a maximum severity flaw in IOS XE Software for Wireless LAN Controllers by a hard-coded JSON Web Token (JWT) that allows an unauthenticated remote attacker to take over devices. This t … Read more Published Date: May 08, 2025 (2 hours, 16 minutes ago) […]

CVE-2025-4475 – Here is a potential title for the vulnerability: “Apache Struts Remote Code Execution Vulnerability”

The following table lists the changes that have been made to the CVE-2025-4475 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by c6156efd-4bd0-48d7-8520-680200527478 May. 08, 2025 Action […]

CVE-2025-46833 – Apache SimplePythonEncryption RSA Brute Force Decryption Vulnerability

The following table lists the changes that have been made to the CVE-2025-46833 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]

CVE-2025-46812 – Trix Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-46812 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]

CVE-2025-46712 – Erlang/OTP SSH Man-in-the-Middle Injection Vulnerability

Erlang/OTP is a set of libraries for the Erlang programming language. In versions prior to OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for OTP-26), and OTP-25.3.2.21 (for OTP-25), Erlang/OTP SSH fails to enforce strict KEX handshake hardening measures by allowing optional messages to be exchanged. This allows a Man-in-the-Middle attacker to inject these messages in a connection during […]