CVE-2025-8529 – CloudFavorites Favorites-Web SSRF Vulnerability

The following table lists the changes that have been made to the CVE-2025-8529 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-46094 – LiquidFiles Arbitrary File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2025-46094 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-46093 – LiquidFiles FTP SETUID Setgid Remote Command Execution

The following table lists the changes that have been made to the CVE-2025-46093 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-27212 – Ubiquiti UniFi Access Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-27212 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-27211 – EdgeMAX EdgeSwitch Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-27211 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]