CVE-2025-53819 – Nix Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-53819 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 14, 2025 Action […]

CVE-2025-53820 – WeGIA Reflected Cross-Site Scripting (XSS)

The following table lists the changes that have been made to the CVE-2025-53820 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 14, 2025 Action […]

CVE-2025-53818 – GitHub Kanban MCP Server Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-53818 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 14, 2025 Action […]

CVE-2025-53643 – AIOHTTP Request Smuggling Vulnerability

The following table lists the changes that have been made to the CVE-2025-53643 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 14, 2025 Action […]

CVE-2025-53640 – Indico Information Disclosure Vulnerability

Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. Starting in version 2.2 and prior to version 3.3.7, an endpoint used to display details of users listed in certain fields (such as ACLs) could be misused to dump basic user details (such as name, affiliation and email) in bulk. […]

CVE-2025-53639 – MeterSphere SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-53639 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 14, 2025 Action […]

CVE-2025-53101 – ImageMagick Stack Overflow

The following table lists the changes that have been made to the CVE-2025-53101 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 14, 2025 Action […]

CVE-2025-53623 – ActiveJob Job Iteration API Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-53623 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 14, 2025 Action […]

CVE-2025-53019 – ImageMagick Memory Leak

The following table lists the changes that have been made to the CVE-2025-53019 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 14, 2025 Action […]

CVE-2025-53015 – ImageMagick XMP File Conversion Infinite Lines Vulnerability

The following table lists the changes that have been made to the CVE-2025-53015 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 14, 2025 Action […]