CVE-2025-8529 – CloudFavorites Favorites-Web SSRF Vulnerability
The following table lists the changes that have been made to the CVE-2025-8529 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]
CVE-2025-46094 – LiquidFiles Arbitrary File Upload Vulnerability
The following table lists the changes that have been made to the CVE-2025-46094 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]
CVE-2025-46093 – LiquidFiles FTP SETUID Setgid Remote Command Execution
The following table lists the changes that have been made to the CVE-2025-46093 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]
CVE-2025-27212 – Ubiquiti UniFi Access Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-27212 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]
CVE-2025-27211 – EdgeMAX EdgeSwitch Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-27211 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]