CVE-2025-5446 – “Linksys Router Remote OS Command Injection Vulnerability”
The following table lists the changes that have been made to the CVE-2025-5446 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]
CVE-2025-5445 – Linksys Wireless Router OS Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-5445 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]
CVE-2025-48745 – Apache HTTP Server Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-48745 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Jun. 02, 2025 Action Type […]
CVE-2025-46806 – “sslh Denial of Service Pointer Offset Vulnerability”
The following table lists the changes that have been made to the CVE-2025-46806 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]
CVE-2025-26396 – SolarWinds Dameware Mini Remote Control Local Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-26396 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]
CVE-2024-12168 – Yandex Telemost DLL Hijacking Vulnerability
The following table lists the changes that have been made to the CVE-2024-12168 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]
CVE-2025-5444 – “Linksys Wireless Router RP_UpgradeFWByBBS OS Command Injection Vulnerability”
The following table lists the changes that have been made to the CVE-2025-5444 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]
CVE-2025-5443 – “Linksys Wireless Router Os Command Injection Vulnerability”
A vulnerability, which was classified as critical, was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function wirelessAdvancedHidden of the file /goform/wirelessAdvancedHidden. The manipulation of the argument ExtChSelector/24GSelector/5GSelector leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public […]
CVE-2025-48495 – Gokapi Cross-Site Scripting (XSS)
Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. By renaming the friendly name of an API key, an authenticated user could inject JS into the API key overview, which would also be executed when another user clicks on his API tab. Prior to version 2.0.0, there was no user permission […]
CVE-2025-48990 – NeKernal Heap Overflow
The following table lists the changes that have been made to the CVE-2025-48990 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]