CVE-2025-3751 – Apache Web Server SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-3751 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 21, 2025 Action […]

CVE-2025-2261 – TIBCO ActiveMatrix Administrator Stored Cross-Site Scripting

The following table lists the changes that have been made to the CVE-2025-2261 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 21, 2025 Action […]

CVE-2025-27558 – Wi-Fi Protected Access (WPA, WPA2, WPA3) and Wired Equivalent Privacy (WEP) Mesh Network FragAttacks

IEEE P802.11-REVme D1.1 through D7.0 allows FragAttacks against mesh networks. In mesh networks using Wi-Fi Protected Access (WPA, WPA2, or WPA3) or Wired Equivalent Privacy (WEP), an adversary can exploit this vulnerability to inject arbitrary frames towards devices that support receiving non-SSP A-MSDU frames. NOTE: this issue exists because of an incorrect fix for CVE-2020-24588. […]

CVE-2024-57529 – Jeppesen JetPlanner Pro Cross Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2024-57529 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 21, 2025 Action […]

CVE-2025-48063 – XWiki Remote Code Execution via Required Rights Bypass

XWiki is a generic wiki platform. In XWiki 16.10.0, required rights were introduced as a way to limit which rights a document can have. Part of the security model of required rights is that a user who doesn’t have a right also cannot define that right as required right. That way, users who are editing […]

CVE-2025-48060 – jq Heap Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-48060 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 May. 21, 2025 Action Type […]

CVE-2025-5033 – XiaoBingby TeaCMS Cross-Site Request Forgery Vulnerability

The following table lists the changes that have been made to the CVE-2025-5033 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 May. 21, 2025 Action Type […]

CVE-2025-5020 – Firefox for iOS URL Spoofing Vulnerability

The following table lists the changes that have been made to the CVE-2025-5020 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 May. 21, 2025 Action Type […]

CVE-2025-48069 – Apache ejson2env Command Injection Vulnerability

ejson2env allows users to decrypt EJSON secrets and export them as environment variables. Prior to version 2.0.8, the `ejson2env` tool has a vulnerability related to how it writes to `stdout`. Specifically, the tool is intended to write an export statement for environment variables and their values. However, due to inadequate output sanitization, there is a […]