CVE-2025-3834 – Zohocorp ManageEngine ADAudit Plus SQL Injection
The following table lists the changes that have been made to the CVE-2025-3834 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 0fc0942c-577d-436f-ae8e-945763c79b02 May. 14, 2025 Action […]
CVE-2025-47292 – Cap Collectif Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-47292 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2025-3833 – Zohocorp ManageEngine ADSelfService Plus SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-3833 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 0fc0942c-577d-436f-ae8e-945763c79b02 May. 14, 2025 Action […]
CVE-2025-26864 – Apache IoTDB OpenIdAuthorizer Sensitive Information Exposure and Tampering
The following table lists the changes that have been made to the CVE-2025-26864 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2025-26795 – Apache IoTDB JDBC Driver Information Exposure and Log Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-26795 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2024-24780 – Apache IoTDB Untrusted URI Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2024-24780 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2025-2875 – Apache Controller Resource Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2025-2875 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2024-8988 – PeepSo Core: File Uploads Plugin WordPress Insecure Direct Object Reference
The following table lists the changes that have been made to the CVE-2024-8988 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2024-13940 – Ninja Forms Webhooks SSRF Vulnerability
The following table lists the changes that have been made to the CVE-2024-13940 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2025-0020 – ArcGIS OAuth 2.0 API Authentication Privilege Abuse Vulnerability
Violation of Secure Design Principles, Hidden Functionality, Incorrect Provision of Specified Functionality vulnerability in ArcGIS (Authentication) allows Privilege Abuse, Manipulating Hidden Fields, Configuration/Environment Manipulation. The ArcGIS client_credentials OAuth 2.0 API implementation does not adhere to the RFC/standards; This hidden (known and by-design, but undocumented) functionality enables a requestor (Referred to as client in RFC 6749) […]