CVE-2025-4731 – TOTOLINK HTTP POST Request Handler Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-4731 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 16, 2025 Action […]

CVE-2025-4730 – TOTOLINK A3002R/A3002RU HTTP POST Request Handler Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-4730 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 16, 2025 Action […]

CVE-2025-4729 – TOTOLINK A3002R/A3002RU Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-4729 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 16, 2025 Action […]

CVE-2025-47930 – Zulip Public Channel Creation Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-47930 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 16, 2025 Action […]

CVE-2025-4728 – SourceCodester Best Online News Portal SQL Injection

The following table lists the changes that have been made to the CVE-2025-4728 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 15, 2025 Action […]

CVE-2025-4726 – iSourcecode Placement Management System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-4726 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 15, 2025 Action […]

CVE-2025-4727 – Meteor DDP-Server Regular Expression Complexity Remote Vulnerability

The following table lists the changes that have been made to the CVE-2025-4727 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 15, 2025 Action […]

CVE-2025-4209 – “Apache HTTP Server Command Injection Vulnerability”

The following table lists the changes that have been made to the CVE-2025-4209 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] May. 15, 2025 Action Type […]

CVE-2025-0921 – Mitsubishi Electric GENESIS64/MC Works64 Symbolic Link Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-0921 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 15, 2025 Action […]