CVE-2025-33103 – IBM i TCP/IP Connectivity Utilities for i Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-33103 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 17, 2025 Action […]

CVE-2025-4829 – TOTOLINK A702R/A3002R/A3002RU HTTP POST Request Handler Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-4829 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 17, 2025 Action […]

CVE-2025-4827 – TOTOLINK A702R/A3002R/A3002RU HTTP POST Request Handler Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-4827 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 17, 2025 Action […]

CVE-2025-48187 – RAGFlow Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-48187 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 17, 2025 Action […]

CVE-2025-4669 – WordPress Booking Calendar Stored Cross-Site Scripting (XSS) Vulnerability

The following table lists the changes that have been made to the CVE-2025-4669 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 17, 2025 Action […]

CVE-2025-3527 – WordPress EventON Pro Stored Cross-Site Scripting (XSS)

The following table lists the changes that have been made to the CVE-2025-3527 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 17, 2025 Action […]

CVE-2024-13613 – Wise Chat WordPress Sensitive Information Exposure

The following table lists the changes that have been made to the CVE-2024-13613 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 17, 2025 Action […]

CVE-2025-3888 – “Jupiter X Core Stored Cross-Site Scripting Vulnerability”

The following table lists the changes that have been made to the CVE-2025-3888 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 17, 2025 Action […]

CVE-2025-4826 – TOTOLINK A702R/A3002R/A3002RU HTTP POST Request Handler Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-4826 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 17, 2025 Action […]