CVE-2025-26496 – Tableau Type Confusion Local Code Inclusion Vulnerability

The following table lists the changes that have been made to the CVE-2025-26496 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 22, 2025 Action […]

CVE-2022-45133 – Mahara XML Font Font Traversal Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2022-45133 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 22, 2025 Action […]

China-linked Silk Typhoon Hackers Target SaaS Providers, Zero Days

China-linked Silk Typhoon Hackers Target SaaS Providers, Zero Days The China-linked advanced persistent threat (APT) group Silk Typhoon has shown a rare ability to compromise trusted relationships in the cloud. That’s one of the key takeaways from new research by Cro … Read more Published Date: Aug 22, 2025 (1 hour, 35 minutes ago) Vulnerabilities has been […]

CVE-2025-57801 – Gnark EdDSA/ECDSA Signature Malleability

The following table lists the changes that have been made to the CVE-2025-57801 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 22, 2025 Action […]

CVE-2022-43110 – Voltronic Power ViewPower and PowerShield Netguard Unauthenticated Remote Command Execution

The following table lists the changes that have been made to the CVE-2022-43110 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Aug. 22, 2025 Action Type […]

CVE-2022-31491 – Voltronic Power Remote Code Execution

The following table lists the changes that have been made to the CVE-2022-31491 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Aug. 22, 2025 Action Type […]

CVE-2025-6791 – Centreon Web SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-6791 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by bd4443e6-1eef-43f3-9886-25fc9ceeaae7 Aug. 22, 2025 Action […]

CVE-2025-55454 – DooTask RCE File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2025-55454 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 22, 2025 Action […]

CVE-2025-54813 – Apache Log4cxx JSONLayout Log Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-54813 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 22, 2025 Action […]

CVE-2025-54812 – Apache Log4cxx Cross-Site Scripting (XSS)

Improper Output Neutralization for Logs vulnerability in Apache Log4cxx. When using HTMLLayout, logger names are not properly escaped when writing out to the HTML file. If untrusted data is used to retrieve the name of a logger, an attacker could theoretically inject HTML or Javascript in order to hide information from logs or steal data […]