CVE-2025-48481 – FreeScout Account Self-Activation Vulnerability
The following table lists the changes that have been made to the CVE-2025-48481 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]
CVE-2025-48480 – FreeScout HTAccess File Deletion Vulnerability
The following table lists the changes that have been made to the CVE-2025-48480 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]
CVE-2025-48478 – FreeScout Mass Assignment Vulnerability
The following table lists the changes that have been made to the CVE-2025-48478 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]
CVE-2025-48476 – FreeScout Password Change Privilege Escalation Vulnerability
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, when adding and editing user records using the fill() method, there is no check for the absence of the password field in the data coming from the user, which leads to a mass-assignment vulnerability. As a result, a user with the […]
CVE-2025-48491 – Project AI Exposed Hardcoded API Key Vulnerability
The following table lists the changes that have been made to the CVE-2025-48491 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]
CVE-2025-48381 – CVAT Information Disclosure Vulnerability
Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. In versions starting from 2.4.0 to before 2.38.0, an authenticated CVAT user may be able to retrieve the IDs and names of all tasks, projects, labels, and the IDs of all jobs and quality reports on the CVAT instance. […]
CVE-2025-48068 – Next.js App Router Local Source Code Exposure
The following table lists the changes that have been made to the CVE-2025-48068 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]
CVE-2025-47952 – Traefik Path Traversal Vulnerability
Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. Prior to versions 2.11.25 and 3.4.1, there is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL […]
CVE-2025-44906 – jhead Heap Use After Free Vulnerability
The following table lists the changes that have been made to the CVE-2025-44906 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]
CVE-2025-44905 – HDF5 Heap Buffer Overflow
The following table lists the changes that have been made to the CVE-2025-44905 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]