CVE-2014-125124 – Pandora FMS Anyterm Remote Command Execution

The following table lists the changes that have been made to the CVE-2014-125124 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]

CVE-2014-125122 – Linksys WRT120N Remote Stack Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2014-125122 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]

CVE-2014-125121 – Array Networks vAPV/vxAG SSH Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2014-125121 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]

CVE-2013-10043 – OAstium VoIP PBX Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2013-10043 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]

CVE-2013-10040 – ClipBucket Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2013-10040 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]

CVE-2013-10039 – GestioIP Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2013-10039 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]

CVE-2013-10038 – FlashChat Arbitrary File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2013-10038 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]

CVE-2013-10037 – WebTester OS Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2013-10037 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]

CVE-2013-10036 – Beetel Connection Manager Stack-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2013-10036 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]

CVE-2013-10035 – ProcessMaker Code Injection Vulnerability

A code injection vulnerability exists in ProcessMaker Open Source versions 2.x when using the default ‘neoclassic’ skin. An authenticated user can execute arbitrary PHP code via multiple endpoints, including appFolderAjax.php, casesStartPage_Ajax.php, and cases_SchedulerGetPlugins.php, by supplying crafted POST requests to parameters such as action and params. These endpoints fail to validate user input and directly invoke […]