CVE-2025-52390 – Saurus CMS SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-52390 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 01, 2025 Action […]

CVE-2025-52361 – Lighttpd AK-Nord USB-Server-LXL Root Command Execution

The following table lists the changes that have been made to the CVE-2025-52361 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 01, 2025 Action […]

CVE-2025-52327 – Restaurant Order System SQL Injection

The following table lists the changes that have been made to the CVE-2025-52327 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 01, 2025 Action […]

CVE-2025-50472 – Apache Spark – Deserialization Code Execution Vulnerability

The modelscope/ms-swift library thru 2.6.1 is vulnerable to arbitrary code execution through deserialization of untrusted data within the `load_model_meta()` function of the `ModelFileSystemCache()` class. Attackers can execute arbitrary code and commands by crafting a malicious serialized `.mdl` payload, exploiting the use of `pickle.load()` on data from potentially untrusted sources. This vulnerability allows for remote code […]

CVE-2025-50460 – Apache Ms-Swift Remote Code Execution (RCE)

The following table lists the changes that have been made to the CVE-2025-50460 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 01, 2025 Action […]

CVE-2025-44139 – Emlog Pro File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2025-44139 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 01, 2025 Action […]

CVE-2019-19144 – Quantum DXi6702 XML External Entity Injection Vulnerability

The following table lists the changes that have been made to the CVE-2019-19144 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 01, 2025 Action […]

Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection

Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection Cybersecurity researchers have disclosed a now-patched, high-severity security flaw in Cursor, a popular artificial intelligence (AI) code editor, that could result in remote code execution. The vulne … Read more Published Date: Aug 01, 2025 (4 hours, 59 minutes ago) Vulnerabilities has been […]

CVE-2025-45767 – Jose Weak Encryption Vulnerability

The following table lists the changes that have been made to the CVE-2025-45767 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 01, 2025 Action […]

CVE-2025-46018 – CSC Pay Mobile App Bluetooth Payment Authorization Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-46018 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 01, 2025 Action […]