CVE-2025-9379 – “Belkin AX1800 Firmware Update Handler Remote Authentication Bypass”
The following table lists the changes that have been made to the CVE-2025-9379 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 24, 2025 Action […]
CVE-2025-8208 – Spexo Addons for Elementor WordPress Stored Cross-Site Scripting
CVE ID : CVE-2025-8208 Published : Aug. 24, 2025, 6:15 a.m. | 1 hour, 22 minutes ago Description : The Spexo Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s Countdown widget in all versions up to, and including, 1.0.23 due to insufficient input sanitization and output escaping on user supplied […]
CVE-2025-36174 – IBM Integrated Analytics System File Upload Arbitrary Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-36174 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 24, 2025 Action […]
CVE-2025-36157 – IBM Jazz Foundation Unauthorized File Update Vulnerability
The following table lists the changes that have been made to the CVE-2025-36157 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 24, 2025 Action […]