CVE-2025-53534 – RatPanel Remote Code Execution and Unauthorized Access Vulnerability
RatPanel is a server operation and maintenance management panel. In versions 2.3.19 through 2.5.5, when an attacker obtains the backend login path of RatPanel (including but not limited to weak default paths, brute-force cracking, etc.), they can execute system commands or take over hosts managed by the panel without logging in. In addition to this […]
CVE-2025-52237 – SSCMS Directory Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-52237 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-52078 – Writebot AI Content Generator SaaS File Upload Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-52078 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-50592 – Seacms Cross Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-50592 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-51541 – Shopware Stored XSS Vulnerability
A stored cross-site scripting (XSS) vulnerability exists in the Shopware 6 installation interface at /recovery/install/database-configuration/. The c_database_schema field fails to properly sanitize user-supplied input before rendering it in the browser, allowing an attacker to inject malicious JavaScript. This vulnerability can be exploited via a Cross-Site Request Forgery (CSRF) attack due to the absence of CSRF […]
CVE-2014-125113 – Dell KACE K1000 System Management Appliance Unrestricted File Upload Vulnerability
The following table lists the changes that have been made to the CVE-2014-125113 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2013-10070 – Apache PHP-Charts PHP Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2013-10070 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2013-10069 – D-Link Router OS Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2013-10069 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2013-10068 – Foxit Reader Plugin Stack-Based Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2013-10068 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2013-10067 – Glossword Remote Code Execution (RCE) Vulnerability
The following table lists the changes that have been made to the CVE-2013-10067 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]