CVE-2025-3230 – Mattermost Unvalidated Personal Access Token Deactivation
The following table lists the changes that have been made to the CVE-2025-3230 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]
CVE-2025-2571 – Mattermost Google OAuth Credential Disclosure
The following table lists the changes that have been made to the CVE-2025-2571 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]
CVE-2025-1792 – Mattermost Guest Access Control Vulnerability
The following table lists the changes that have been made to the CVE-2025-1792 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]
CVE-2024-7097 – WSO2 SOAP Admin Service Authorization Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2024-7097 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 May. 30, 2025 Action Type […]
CVE-2024-7096 – WSO2 SOAP Admin Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2024-7096 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by ed10eef1-636d-4fbe-9993-6890dfa878f8 May. 30, 2025 Action […]
CVE-2025-0602 – “SolidWorks Collaborative Industry Innovator Stored XSS Vulnerability”
The following table lists the changes that have been made to the CVE-2025-0602 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]
Vulnerabilities in applications preloaded on Ulefone and Krüger&Matz smartphones
Vulnerabilities in applications preloaded on Ulefone and Krüger&Matz smartphones CVE ID CVE-2024-13915 Publication date 30 May 2025 Vendor Ulefone and Krüger&Matz Product com.pri.factorytest Vulnerable versions All through 1.0 Vulnerability type (CWE) Improper Export of Android Ap … Read more Published Date: May 30, 2025 (2 hours, 20 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-13917 […]
CVE-2025-4598 – Systemd-coredump SUID Process Core Dump File Access Vulnerability
A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original’s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a […]
CVE-2025-48331 – Vanquish WooCommerce Orders & Customers Exporter Sensitive Data Exposure
The following table lists the changes that have been made to the CVE-2025-48331 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]
Critical Icinga 2 Vulnerability Allows Attackers to Bypass Validation and Obtain Certificates
Critical Icinga 2 Vulnerability Allows Attackers to Bypass Validation and Obtain Certificates A critical security vulnerability discovered in Icinga 2 monitoring systems enables attackers to bypass certificate validation and obtain legitimate certificates for impersonating trusted network node … Read more Published Date: May 30, 2025 (1 hour, 25 minutes ago) Vulnerabilities has been mentioned in this article. […]