CVE-2025-48481 – FreeScout Account Self-Activation Vulnerability

The following table lists the changes that have been made to the CVE-2025-48481 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]

CVE-2025-48480 – FreeScout HTAccess File Deletion Vulnerability

The following table lists the changes that have been made to the CVE-2025-48480 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]

CVE-2025-48478 – FreeScout Mass Assignment Vulnerability

The following table lists the changes that have been made to the CVE-2025-48478 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]

CVE-2025-48476 – FreeScout Password Change Privilege Escalation Vulnerability

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, when adding and editing user records using the fill() method, there is no check for the absence of the password field in the data coming from the user, which leads to a mass-assignment vulnerability. As a result, a user with the […]

CVE-2025-48491 – Project AI Exposed Hardcoded API Key Vulnerability

The following table lists the changes that have been made to the CVE-2025-48491 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]

CVE-2025-48381 – CVAT Information Disclosure Vulnerability

Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. In versions starting from 2.4.0 to before 2.38.0, an authenticated CVAT user may be able to retrieve the IDs and names of all tasks, projects, labels, and the IDs of all jobs and quality reports on the CVAT instance. […]

CVE-2025-48068 – Next.js App Router Local Source Code Exposure

The following table lists the changes that have been made to the CVE-2025-48068 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]

CVE-2025-47952 – Traefik Path Traversal Vulnerability

Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. Prior to versions 2.11.25 and 3.4.1, there is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL […]

CVE-2025-44906 – jhead Heap Use After Free Vulnerability

The following table lists the changes that have been made to the CVE-2025-44906 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]

CVE-2025-44905 – HDF5 Heap Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-44905 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]