CVE-2025-35036 – Apache Hibernate Expression Language Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-35036 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 9119a7d8-5eab-497f-8521-727c672e3725 Jun. 03, 2025 Action […]

CVE-2025-23100 – Samsung Exynos NULL Check Denial of Service Vulnerability

The following table lists the changes that have been made to the CVE-2025-23100 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2025-23098 – Samsung Mobile Processor Exynos Use-After-Free Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-23098 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2025-23097 – Samsung Mobile Processor Exynos 1380 Out-of-Bounds Write Vulnerability

The following table lists the changes that have been made to the CVE-2025-23097 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2025-5521 – WuKongOpenSource WukongCRM Cross-Site Request Forgery Vulnerability

The following table lists the changes that have been made to the CVE-2025-5521 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Jun. 03, 2025 Action Type […]

CVE-2025-5522 – Jack0240 魏 bskms 蓝天幼儿园管理系统 Unauthenticated Remote Authorization Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-5522 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2025-48998 – DataEase Arbitrary File Deserialization

The following table lists the changes that have been made to the CVE-2025-48998 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2025-48997 – Multer DoS Denial of Service Vulnerability

The following table lists the changes that have been made to the CVE-2025-48997 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2025-48953 – Umbraco File Upload Extension Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-48953 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2025-48950 – MaxKB Sandbox Directory Permission Bypass Vulnerability

MaxKB is an open-source AI assistant for enterprise. Prior to version 1.10.8-lts, Sandbox only restricts the execution permissions of binary files in common directories, such as `/bin,/usr/bin`, etc. Therefore, attackers can exploit some files with execution permissions in non blacklisted directories to carry out attacks. Version 1.10.8-lts fixes the issue.