CVE-2025-57802 – Airlink Docker Bind Mount Symlink Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-57802 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]

CVE-2025-50383 – Easy!Appointments SQL Injection

The following table lists the changes that have been made to the CVE-2025-50383 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]

Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3

Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3 Aug 25, 2025Ravie LakshmananContainer Security / Vulnerability Docker has released fixes to address a critical security flaw affecting the Docker Desktop app for Windows and macOS that could potenti … Read more Published Date: Aug 25, 2025 (2 hours, 29 minutes ago) Vulnerabilities has been mentioned […]

CVE-2025-9411 – “LostVIP.com Ruoyi-go SQL Injection Vulnerability”

The following table lists the changes that have been made to the CVE-2025-9411 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]

CVE-2025-9410 – LostVIP Ruoyi-go SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-9410 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]

CVE-2025-57773 – DataEase JNDI Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-57773 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]

CVE-2025-57772 – DataEase H2 JDBC RCE Bypass

The following table lists the changes that have been made to the CVE-2025-57772 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]

CVE-2025-57760 – Langflow Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-57760 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]

CVE-2025-53120 – “Juniper Unified PAM Remote Code Execution via Path Traversal”

The following table lists the changes that have been made to the CVE-2025-53120 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]

CVE-2025-50722 – Apache Sparkshop Unauthenticated Remote Code Execution

The following table lists the changes that have been made to the CVE-2025-50722 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Aug. 25, 2025 Action Type […]