CVE-2025-32803 – Kea File Permission Vulnerability

The following table lists the changes that have been made to the CVE-2025-32803 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]

CVE-2025-31501 – Best Practical RT Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-31501 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]

CVE-2025-31500 – Best Practical RT Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-31500 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]

CVE-2025-30087 – Best Practical RT Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-30087 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]

CVE-2024-47057 – Mautic User Enumeration Timing Attack

The following table lists the changes that have been made to the CVE-2024-47057 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]

CVE-2025-1461 – Vuetify VCalendar XSS Injection

The following table lists the changes that have been made to the CVE-2025-1461 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 36c7be3b-2937-45df-85ea-ca7133ea542c May. 28, 2025 Action […]

CVE-2024-57338 – M2Soft CROWNIX Report & ERS Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2024-57338 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]

CVE-2024-57337 – CROWNIX Report & ERS Arbitrary Code Execution

The following table lists the changes that have been made to the CVE-2024-57337 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]

CVE-2024-57336 – M2Soft CROWNIX Report & ERS Unauthenticated Administrator Account Access

The following table lists the changes that have been made to the CVE-2024-57336 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]

CVE-2024-47055 – Mautic Insecure Direct Object Reference (IDOR) / Missing Authorization Vulnerability

The following table lists the changes that have been made to the CVE-2024-47055 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]