CVE-2025-4539 – Hainan ToDesk DLL File Parser Uncontrolled Search Path Vulnerability

The following table lists the changes that have been made to the CVE-2025-4539 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]

CVE-2025-4538 – KKFileView Unrestricted File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2025-4538 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]

CVE-2025-4537 – RuoYi-Vue Cleartext Storage of Sensitive Information in Cookie

The following table lists the changes that have been made to the CVE-2025-4537 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]

CVE-2025-4536 – Gosuncn Technology Group Audio-Visual Integrated Management Platform Remote Information Disclosure

The following table lists the changes that have been made to the CVE-2025-4536 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]

CVE-2025-4535 – Gosuncn Technology Group Audio-Visual Integrated Management Platform Remote Configuration File Handler Information Disclosure

The following table lists the changes that have been made to the CVE-2025-4535 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]

CVE-2025-4534 – SunGrow Logger1000 Remote Weak Password Requirements Vulnerability

The following table lists the changes that have been made to the CVE-2025-4534 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]

CVE-2025-4533 – JeecgBoot Document Library Upload Remote Resource Consumption Vulnerability

The following table lists the changes that have been made to the CVE-2025-4533 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]

CVE-2025-4532 – Shanghai Bairui Information Technology SunloginClient DLL Search Path Vulnerability (Uncontrolled Search Path)

The following table lists the changes that have been made to the CVE-2025-4532 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]

CVE-2025-4531 – Seeyon Zhiyuan OA Web Application System Remote Code Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-4531 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]

CVE-2025-4530 – Feng Ha Ha Megagao SSM-ERP/Production SSM Path Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2025-4530 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 11, 2025 Action […]