CVE-2025-52239 – ZKEACMS File Upload Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-52239 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Aug. 04, 2025 Action Type […]

CVE-2025-38741 – “Dell Enterprise SONiC OS SSH Cryptographic Key Exposure Vulnerability”

The following table lists the changes that have been made to the CVE-2025-38741 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-26476 – Dell ECS Hard-coded Cryptographic Key Unauthorized Access Vulnerability

The following table lists the changes that have been made to the CVE-2025-26476 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-21120 – Dell Avamar HTTP Permission Methods Vulnerability

The following table lists the changes that have been made to the CVE-2025-21120 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-8520 – Givanz Vvveb SSRF Vulnerability

The following table lists the changes that have been made to the CVE-2025-8520 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-8519 – Givanz Vvveb Drag-and-Drop Editor Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2025-8519 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-51390 – TOTOLINK N600R Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-51390 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-46206 – Artifex mupdf Denial of Service (DoS) Vulnerability

The following table lists the changes that have been made to the CVE-2025-46206 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-34147 – Shenzhen Aitemi M300 Wi-Fi Repeater OS Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-34147 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2024-45183 – Samsung Exynos JPEG Length Check Vulnerability (Buffer Overflow)

The following table lists the changes that have been made to the CVE-2024-45183 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]