CVE-2025-41225 – VMware vCenter Server Command Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-41225 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 20, 2025 Action […]

CVE-2025-41228 – VMware ESXi and vCenter Server Cross-Site Scripting (XSS)

The following table lists the changes that have been made to the CVE-2025-41228 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 20, 2025 Action […]

CVE-2025-41227 – VMware ESXi, Workstation, and Fusion Denial-of-Service Memory Exhaustion Vulnerability

The following table lists the changes that have been made to the CVE-2025-41227 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 20, 2025 Action […]

CVE-2025-41226 – VMware ESXi Guest Operation Denial-of-Service

The following table lists the changes that have been made to the CVE-2025-41226 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 20, 2025 Action […]

CVE-2025-26086 – RSI Queue Management System Blind SQL Injection

The following table lists the changes that have been made to the CVE-2025-26086 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 20, 2025 Action […]

CVE-2023-33861 – IBM Security ReaQta EDR Man-in-the-Middle (MITM) Spoofing Vulnerability

The following table lists the changes that have been made to the CVE-2023-33861 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 20, 2025 Action […]

CVE-2025-4980 – Netgear DGND3700 HTTP Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2025-4980 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 20, 2025 Action […]

CVE-2025-47941 – TYPO3 Backend MFA Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-47941 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 20, 2025 Action […]

CVE-2025-47936 – TYPO3 CSRF Vulnerability in Webhooks

TYPO3 is an open source, PHP based web content management system. In versions on the 12.x branch prior to 12.4.31 LTS and the 13.x branch prior to 13.4.2 LTS, Webhooks are inherently vulnerable to Cross-Site Request Forgery (CSRF), which can be exploited by adversaries to target internal resources (e.g., localhost or other services on the […]