CVE-2025-4539 – Hainan ToDesk DLL File Parser Uncontrolled Search Path Vulnerability
The following table lists the changes that have been made to the CVE-2025-4539 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]
CVE-2025-4538 – KKFileView Unrestricted File Upload Vulnerability
The following table lists the changes that have been made to the CVE-2025-4538 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]
CVE-2025-4537 – RuoYi-Vue Cleartext Storage of Sensitive Information in Cookie
The following table lists the changes that have been made to the CVE-2025-4537 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]
CVE-2025-4536 – Gosuncn Technology Group Audio-Visual Integrated Management Platform Remote Information Disclosure
The following table lists the changes that have been made to the CVE-2025-4536 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]
CVE-2025-4535 – Gosuncn Technology Group Audio-Visual Integrated Management Platform Remote Configuration File Handler Information Disclosure
The following table lists the changes that have been made to the CVE-2025-4535 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]
CVE-2025-4534 – SunGrow Logger1000 Remote Weak Password Requirements Vulnerability
The following table lists the changes that have been made to the CVE-2025-4534 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]
CVE-2025-4533 – JeecgBoot Document Library Upload Remote Resource Consumption Vulnerability
The following table lists the changes that have been made to the CVE-2025-4533 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]
CVE-2025-4532 – Shanghai Bairui Information Technology SunloginClient DLL Search Path Vulnerability (Uncontrolled Search Path)
The following table lists the changes that have been made to the CVE-2025-4532 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]
CVE-2025-4531 – Seeyon Zhiyuan OA Web Application System Remote Code Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-4531 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]
CVE-2025-4530 – Feng Ha Ha Megagao SSM-ERP/Production SSM Path Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-4530 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]