CVE-2025-2633 – NI LabVIEW Out-of-Bounds Read Arbitrary Code Execution

The following table lists the changes that have been made to the CVE-2025-2633 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 23, 2025 Action […]

CVE-2025-6018 – Linux PAM pam-config Local Privilege Escalation

A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, “allow_active” user. The highest risk is that the attacker can then perform […]

CVE-2025-40598 – HPE SMA100 Series Reflected Cross-Site Scripting (XSS)

The following table lists the changes that have been made to the CVE-2025-40598 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 23, 2025 Action […]

CVE-2025-40597 – D-Link SMA100 Series Heap-based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-40597 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 23, 2025 Action […]

CVE-2025-40596 – SMA100 Series Web Interface Stack-based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-40596 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 23, 2025 Action […]

CVE-2025-33077 – IBM Engineering Systems Design Rhapsody Stack-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-33077 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 23, 2025 Action […]

CVE-2025-33020 – IBM Engineering Systems Design Rhapsody Unencrypted Sensitive Information Disclosure

The following table lists the changes that have been made to the CVE-2025-33020 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 23, 2025 Action […]

CVE-2025-36117 – IBM Db2 Mirror for i Session ID Impersonation Vulnerability

The following table lists the changes that have been made to the CVE-2025-36117 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 23, 2025 Action […]

CVE-2025-36116 – IBM Db2 Mirror for i Cross-Site WebSocket Hijacking Vulnerability

The following table lists the changes that have been made to the CVE-2025-36116 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 23, 2025 Action […]

CVE-2025-33076 – IBM Engineering Systems Design Rhapsody Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-33076 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 23, 2025 Action […]