CVE-2025-45474 – Maccms SSRF Vulnerability

The following table lists the changes that have been made to the CVE-2025-45474 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]

CVE-2025-3913 – Mattermost Team Privacy Setting Permission Validation Vulnerability

The following table lists the changes that have been made to the CVE-2025-3913 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]

CVE-2025-5334 – Devolutions Remote Desktop Manager Private Data Exposure and Unauthorized Access

The following table lists the changes that have been made to the CVE-2025-5334 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]

CVE-2025-5321 – Aimhubio Aim Remote Sandbox Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-5321 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]

CVE-2025-4081 – DaVinci Resolve Dynamic Library Validation Bypass

The following table lists the changes that have been made to the CVE-2025-4081 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]

CVE-2025-48748 – Netwrix Directory Manager Hard-Coded Password Vulnerability

The following table lists the changes that have been made to the CVE-2025-48748 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 May. 29, 2025 Action Type […]

CVE-2024-22654 – “tcpreplay Infinite Loop Vulnerability”

The following table lists the changes that have been made to the CVE-2024-22654 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]

CVE-2024-22653 – Yasm NULL Pointer Dereference Vulnerability

The following table lists the changes that have been made to the CVE-2024-22653 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]

CVE-2025-5320 – Gradio CORS Handler Origin Validation Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-5320 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]

CVE-2025-46080 – HuoCMS File Upload Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-46080 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 29, 2025 Action […]