CVE-2025-7365 – Keycloak Email Hijacking Vulnerability

The following table lists the changes that have been made to the CVE-2025-7365 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 10, 2025 Action […]

CVE-2025-46835 – Git GUI Directory Traversal Write Permission Vulnerability

Git GUI allows you to use the Git source control management tools via a GUI. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory in the repository, then Git GUI can create and overwrite files for which the user has write permission. This vulnerability […]

CVE-2025-44251 – Ecovacs Deebot Wi-Fi Credential Transmission Vulnerability

Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endorsed nor certified by the NVD. Shell Updated: 1 hour, 36 minutes ago 166 stars 23 fork 23 watcher Born at : May 17, 2023, 8 a.m. This repo has been linked 44 different CVEs […]

CVE-2025-46334 – Git GUI Path Injection Vulnerability

Git GUI allows you to use the Git source control management tools via a GUI. A malicious repository can ship versions of sh.exe or typical textconv filter programs such as astextplain. Due to the unfortunate design of Tcl on Windows, the search path when looking for an executable always includes the current directory. The mentioned […]

CVE-2025-27613 – Gitk File Truncation Vulnerability

Gitk is a Tcl/Tk based Git history browser. Starting with 1.7.0, when a user clones an untrusted repository and runs gitk without additional command arguments, files for which the user has write permission can be created and truncated. The option Support per-file encoding must have been enabled before in Gitk’s Preferences. This option is disabled […]

CVE-2024-39752 – IBM Analytics Content Hub File Upload Vulnerability (Remote Code Execution)

The following table lists the changes that have been made to the CVE-2024-39752 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 10, 2025 Action […]

CVE-2025-36090 – IBM Analytics Content Hub Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2025-36090 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 10, 2025 Action […]

CVE-2025-27614 – Gitk Command Injection Vulnerability

Gitk is a Tcl/Tk based Git history browser. Starting with 2.41.0, a Git repository can be crafted in such a way that with some social engineering a user who has cloned the repository can be tricked into running any script (e.g., Bourne shell, Perl, Python, …) supplied by the attacker by invoking gitk filename, where […]

CVE-2024-38327 – IBM Analytics Content Hub Exposed JavaScript Source Map Information Disclosure

The following table lists the changes that have been made to the CVE-2024-38327 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 10, 2025 Action […]

CVE-2024-37524 – IBM Analytics Content Hub Information Disclosure

The following table lists the changes that have been made to the CVE-2024-37524 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 10, 2025 Action […]