CVE-2025-47929 – DumbDrop DOM Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-47929 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 15, 2025 Action […]
CVE-2025-1138 – IBM InfoSphere Information Server Directory Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-1138 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 15, 2025 Action […]
CVE-2025-4717 – PHPGurukul Company Visitor Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-4717 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 15, 2025 Action […]
CVE-2025-4716 – Campcodes Sales and Inventory System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-4716 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 15, 2025 Action […]
CVE-2025-4715 – Campcodes Sales and Inventory System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-4715 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 15, 2025 Action […]
CVE-2025-47928 – Spotify/Github Spotipy Untrusted Code Execution Vulnerability
Spotipy is a Python library for the Spotify Web API. As of commit 4f5759dbfb4506c7b6280572a4db1aabc1ac778d, using `pull_request_target` on `.github/workflows/integration_tests.yml` followed by the checking out the head.sha of a forked PR can be exploited by attackers, since untrusted code can be executed having full access to secrets (from the base repo). By exploiting the vulnerability is possible […]
CVE-2025-47787 – Emlog Pro Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-47787 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 15, 2025 Action […]
CVE-2025-47786 – Emlog Stored Cross-Site Scripting Vulnerability
Emlog is an open source website building system. Version 2.5.13 has a stored cross-site scripting vulnerability that allows any registered user to construct malicious JavaScript, inducing all website users to click. In `/admin/comment.php`, the parameter `perpage_num` is not validated and is directly stored in the `admin_commend_perpage_num` field of the `emlog_options` table in the database. Moreover, […]
CVE-2025-47789 – Horilla Phishing Redirect Vulnerability
The following table lists the changes that have been made to the CVE-2025-47789 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 15, 2025 Action […]
CVE-2025-47788 – Atheos File Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-47788 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 15, 2025 Action […]