CVE-2025-54689 – Improper Control of Filename for Include/Require S
The following table lists the changes that have been made to the CVE-2025-54689 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-54688 – Crocoblock JetEngine Cross-site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2025-54688 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-54687 – Crocoblock JetTabs Cross-site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-54687 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-54685 – Brainstorm Force SureDash Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2025-54685 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-54686 – Deserialization of Untrusted Data vulnerability in
The following table lists the changes that have been made to the CVE-2025-54686 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-54678 – Improper Neutralization of Special Elements used i
The following table lists the changes that have been made to the CVE-2025-54678 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-54669 – Improper Neutralization of Special Elements used i
The following table lists the changes that have been made to the CVE-2025-54669 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-52823 – Improper Neutralization of Special Elements used i
The following table lists the changes that have been made to the CVE-2025-52823 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-52820 – Improper Neutralization of Special Elements used i
The following table lists the changes that have been made to the CVE-2025-52820 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-52732 – Improper Control of Filename for Include/Require S
The following table lists the changes that have been made to the CVE-2025-52732 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]