CVE-2025-3230 – Mattermost Unvalidated Personal Access Token Deactivation

The following table lists the changes that have been made to the CVE-2025-3230 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]

CVE-2025-2571 – Mattermost Google OAuth Credential Disclosure

The following table lists the changes that have been made to the CVE-2025-2571 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]

CVE-2025-1792 – Mattermost Guest Access Control Vulnerability

The following table lists the changes that have been made to the CVE-2025-1792 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]

CVE-2024-7097 – WSO2 SOAP Admin Service Authorization Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2024-7097 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 May. 30, 2025 Action Type […]

CVE-2024-7096 – WSO2 SOAP Admin Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2024-7096 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by ed10eef1-636d-4fbe-9993-6890dfa878f8 May. 30, 2025 Action […]

CVE-2025-0602 – “SolidWorks Collaborative Industry Innovator Stored XSS Vulnerability”

The following table lists the changes that have been made to the CVE-2025-0602 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]

Vulnerabilities in applications preloaded on Ulefone and Krüger&Matz smartphones

Vulnerabilities in applications preloaded on Ulefone and Krüger&Matz smartphones CVE ID CVE-2024-13915 Publication date 30 May 2025 Vendor Ulefone and Krüger&Matz Product com.pri.factorytest Vulnerable versions All through 1.0 Vulnerability type (CWE) Improper Export of Android Ap … Read more Published Date: May 30, 2025 (2 hours, 20 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-13917 […]

CVE-2025-4598 – Systemd-coredump SUID Process Core Dump File Access Vulnerability

A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original’s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a […]

CVE-2025-48331 – Vanquish WooCommerce Orders & Customers Exporter Sensitive Data Exposure

The following table lists the changes that have been made to the CVE-2025-48331 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]

Critical Icinga 2 Vulnerability Allows Attackers to Bypass Validation and Obtain Certificates

Critical Icinga 2 Vulnerability Allows Attackers to Bypass Validation and Obtain Certificates A critical security vulnerability discovered in Icinga 2 monitoring systems enables attackers to bypass certificate validation and obtain legitimate certificates for impersonating trusted network node … Read more Published Date: May 30, 2025 (1 hour, 25 minutes ago) Vulnerabilities has been mentioned in this article. […]