CVE-2025-5390 – JeeWMS File Handler Improper Access Control Remote Vulnerability

The following table lists the changes that have been made to the CVE-2025-5390 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 31, 2025 Action […]

CVE-2025-5389 – JeeWMS Improper Access Controls Remote Vulnerability

The following table lists the changes that have been made to the CVE-2025-5389 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 31, 2025 Action […]

CVE-2025-5388 – JeeWMS SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-5388 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 31, 2025 Action […]

CVE-2025-5387 – JeeWMS File Handler Improper Access Controls Remote Vulnerability

The following table lists the changes that have been made to the CVE-2025-5387 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 31, 2025 Action […]

CVE-2025-5386 – JeeWMS SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-5386 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 31, 2025 Action […]

CVE-2025-5385 – JeeWMS Path Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2025-5385 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 31, 2025 Action […]

CVE-2025-5384 – JeeWMS SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-5384 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 31, 2025 Action […]

CVE-2025-5381 – Yifang CMS Path Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2025-5381 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 31, 2025 Action […]

CVE-2025-5383 – Yifang CMS Article Management Module Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-5383 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 31, 2025 Action […]

CVE-2025-5380 – Ashinigit XueShengZhuSu Image File Upload Remote Path Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2025-5380 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 31, 2025 Action […]