CVE-2025-3932 – Thunderbird External Attachment URL Access Vulnerability

The following table lists the changes that have been made to the CVE-2025-3932 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]

CVE-2025-3909 – Thunderbird JavaScript File Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-3909 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]

CVE-2025-3877 – Thunderbird Unsolicited PDF Download and Disk Filling Vulnerability

The following table lists the changes that have been made to the CVE-2025-3877 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]

CVE-2025-26785 – Samsung Exynos Out-of-Bounds Write Vulnerability

An issue was discovered in NAS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. The lack of a length check leads to out-of-bounds writes.

CVE-2025-26784 – Samsung Exynos NAS Buffer Overflow Vulnerability

An issue was discovered in NAS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. The lack of a length check leads to out-of-bounds writes.

CVE-2025-47782 – MotionEye Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-47782 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]

CVE-2025-47778 – Sulu SVG XML External Entity Reference Vulnerability

Sulu is an open-source PHP content management system based on the Symfony framework. Starting in versions 2.5.21, 2.6.5, and 3.0.0-alpha1, an admin user can upload SVG which may load external data via XML DOM library. This can be used for insecure XML External Entity References. The problem has been patched in versions 2.6.9, 2.5.25, and […]

CVE-2025-47777 – 5ire Stored XSS and RCE Vulnerability

The following table lists the changes that have been made to the CVE-2025-47777 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]

CVE-2025-47781 – Rallly Token Brute Force Vulnerability

Rallly is an open-source scheduling and collaboration tool. Versions up to and including 3.22.1 of the application features token based authentication. When a user attempts to login to the application, they insert their email and a 6 digit code is sent to their email address to complete the authentication. A token that consists of 6 […]

CVE-2025-47775 – GitHub Bullfrog DNS Exfiltration Vulnerability (Sandbox Bypass)

The following table lists the changes that have been made to the CVE-2025-47775 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]