CVE-2025-30466 – “Safari Same Origin Policy Bypass”
The following table lists the changes that have been made to the CVE-2025-30466 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]
CVE-2025-5327 – “Chshcms MCCMS Gf.php Server-Side Request Forgery Vulnerability”
The following table lists the changes that have been made to the CVE-2025-5327 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]
CVE-2025-5328 – “Chshcms McCms Remote Path Traversal Vulnerability”
The following table lists the changes that have been made to the CVE-2025-5328 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]
CVE-2025-5326 – Zhilink ADP Application Developer Platform Deserialization Vulnerability
The following table lists the changes that have been made to the CVE-2025-5326 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]
CVE-2025-5325 – Zhilink ADP Application Developer Platform Template Engine Code Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-5325 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]
CVE-2025-4967 – Esri Portal for ArcGIS SSRF Bypass
The following table lists the changes that have been made to the CVE-2025-4967 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]
CVE-2025-47933 – Argo CD Cross-Site Scripting (XSS)
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.13.8, 2.14.13, and 3.0.4, an attacker can perform arbitrary actions on behalf of the victim via the API. Due to the improper filtering of URL protocols in the repository page, an attacker can achieve cross-site scripting with permission to edit the […]
CVE-2025-47288 – Discourse Policy Plugin Group Policy Information Disclosure
The following table lists the changes that have been made to the CVE-2025-47288 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]
CVE-2025-3050 – IBM Db2 CPU Resource Allocation Denial of Service
The following table lists the changes that have been made to the CVE-2025-3050 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]
CVE-2025-2518 – IBM Db2 Denial of Service Vulnerability
The following table lists the changes that have been made to the CVE-2025-2518 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]