CVE-2025-4947 – libcurl QUIC Certificate Verification Bypass
The following table lists the changes that have been made to the CVE-2025-4947 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by af854a3a-2127-422b-91ae-364da2661108 May. 28, 2025 Action Type […]
CVE-2025-4009 – Evertz SVDN 3080ipx-10G PHP Web Management Interface Command Injection and Authentication Bypass
The Evertz SVDN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web management interface can be used by administrators to control product features, setup network switching, and register license among other features. The application has been developed in PHP with the webEASY SDK, […]
CVE-2025-4800 – WordPress MasterStudy LMS Pro Arbitrary File Upload Vulnerability
CVE ID : CVE-2025-4800 Published : May 28, 2025, 6:15 a.m. | 26 minutes ago Description : The MasterStudy LMS Pro plugin for WordPress is vulnerable to arbitrary file uploads due to a missing file type validation in the stm_lms_add_assignment_attachment function in all versions up to, and including, 4.7.0. This makes it possible for authenticated attackers, […]
CVE-2025-48848 – Citrix NetScaler HTTP Request Smuggling
The following table lists the changes that have been made to the CVE-2025-48848 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] May. 28, 2025 Action Type […]
CVE-2025-48847 – Dropbox Unvalidated Redirect
The following table lists the changes that have been made to the CVE-2025-48847 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] May. 28, 2025 Action Type […]
CVE-2025-48846 – VMware Remote Code Execution
CVE ID : CVE-2025-48846 Published : May 28, 2025, 4:15 a.m. | 25 minutes ago Description : Rejected reason: Not used Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE-2025-48845 – Apache HTTP Server Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-48845 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] May. 28, 2025 Action Type […]
CVE-2025-48844 – QNAP NAS Denial of Service
The following table lists the changes that have been made to the CVE-2025-48844 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] May. 28, 2025 Action Type […]
CVE-2025-48843 – Apache Struts Deserialization Vulnerability
The following table lists the changes that have been made to the CVE-2025-48843 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] May. 28, 2025 Action Type […]
CVE-2025-48842 – Apache HTTP Server Cross-Site Request Forgery
The following table lists the changes that have been made to the CVE-2025-48842 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] May. 28, 2025 Action Type […]