CVE-2025-5119 – Emlog Pro SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-5119 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 May. 23, 2025 Action Type […]
CVE-2025-48741 – StrangeBee TheHive Broken Access Control Vulnerability
A Broken Access Control vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, and 5.4.0 before 5.4.10 allows remote, authenticated, and unprivileged users to retrieve alerts, cases, logs, observables, or tasks, regardless of the user’s permissions, through a specific API endpoint.
CVE-2025-48740 – StrangeBee TheHive CSRF
A Cross-Site Request Forgery (CSRF) vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, 5.4.0 before 5.4.10, and 5.5.0 before 5.5.1 allows a remote attacker to trigger requests on their victim’s behalf, if the attacker lures a privileged user, authenticated with basic authentication.
CVE-2025-48739 – TheHive SSRF
The following table lists the changes that have been made to the CVE-2025-48739 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 23, 2025 Action […]
CVE-2025-48738 – StrangeBee TheHive Email Flood Vulnerability
An e-mail flooding vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, 5.4.0 before 5.4.10, and 5.5.0 before 5.5.1 allows unauthenticated remote attackers to use the password reset feature without limits. This can lead to several consequences, including mailbox storage exhaustion for targeted users, reputation damage to the SMTP server, potentially causing it to […]
CVE-2025-48735 – BOS IPC SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-48735 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 23, 2025 Action […]
CVE-2025-46176 – D-Link DIR-605L DIR-816L Telnet Command Injection
The following table lists the changes that have been made to the CVE-2025-46176 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 23, 2025 Action […]
CVE-2025-44998 – TinyFileManager Stored XSS
The following table lists the changes that have been made to the CVE-2025-44998 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 23, 2025 Action […]
CVE-2024-51102 – PHPGURUKUL Student Management System SQL Injection
The following table lists the changes that have been made to the CVE-2024-51102 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 23, 2025 Action […]
CVE-2023-34873 – MOBOTIX Camera Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2023-34873 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 23, 2025 Action […]