CVE-2025-32803 – Kea File Permission Vulnerability
The following table lists the changes that have been made to the CVE-2025-32803 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]
CVE-2025-31501 – Best Practical RT Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-31501 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]
CVE-2025-31500 – Best Practical RT Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-31500 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]
CVE-2025-30087 – Best Practical RT Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-30087 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]
CVE-2024-47057 – Mautic User Enumeration Timing Attack
The following table lists the changes that have been made to the CVE-2024-47057 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]
CVE-2025-1461 – Vuetify VCalendar XSS Injection
The following table lists the changes that have been made to the CVE-2025-1461 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 36c7be3b-2937-45df-85ea-ca7133ea542c May. 28, 2025 Action […]
CVE-2024-57338 – M2Soft CROWNIX Report & ERS Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2024-57338 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]
CVE-2024-57337 – CROWNIX Report & ERS Arbitrary Code Execution
The following table lists the changes that have been made to the CVE-2024-57337 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]
CVE-2024-57336 – M2Soft CROWNIX Report & ERS Unauthenticated Administrator Account Access
The following table lists the changes that have been made to the CVE-2024-57336 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]
CVE-2024-47055 – Mautic Insecure Direct Object Reference (IDOR) / Missing Authorization Vulnerability
The following table lists the changes that have been made to the CVE-2024-47055 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 28, 2025 Action […]