CVE-2025-31511 – AlertEnterprise Guardian Bypass Manager Approval Vulnerability

The following table lists the changes that have been made to the CVE-2025-31511 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]

CVE-2025-51479 – Onyx Enterprise Edition Authorization Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-51479 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Jul. 22, 2025 Action Type […]

CVE-2025-51471 – Ollama Cross-Domain Token Exposure Information Disclosure

The following table lists the changes that have been made to the CVE-2025-51471 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]

CVE-2025-51459 – Eosphoros-ai DB-GPT File Upload RCE

The following table lists the changes that have been made to the CVE-2025-51459 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]

CVE-2025-48964 – ping in iputils through 20240905 allows a denial o

The following table lists the changes that have been made to the CVE-2025-48964 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-51464 – Cross-site Scripting (XSS) in aimhubio Aim 3.28.0

The following table lists the changes that have been made to the CVE-2025-51464 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2024-38335 – IBM Security QRadar Network Threat Analytics 1.0.0

The following table lists the changes that have been made to the CVE-2024-38335 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-6741 – Improper access control in secure message componen

The following table lists the changes that have been made to the CVE-2025-6741 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-6523 – Use of weak credentials in emergency authenticatio

The following table lists the changes that have been made to the CVE-2025-6523 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-51482 – Remote Code Execution in letta.server.rest_api.rou

The following table lists the changes that have been made to the CVE-2025-51482 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.