CVE-2025-57802 – Airlink Docker Bind Mount Symlink Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-57802 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]
CVE-2025-50383 – Easy!Appointments SQL Injection
The following table lists the changes that have been made to the CVE-2025-50383 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]
Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3
Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3 Aug 25, 2025Ravie LakshmananContainer Security / Vulnerability Docker has released fixes to address a critical security flaw affecting the Docker Desktop app for Windows and macOS that could potenti … Read more Published Date: Aug 25, 2025 (2 hours, 29 minutes ago) Vulnerabilities has been mentioned […]
CVE-2025-9411 – “LostVIP.com Ruoyi-go SQL Injection Vulnerability”
The following table lists the changes that have been made to the CVE-2025-9411 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]
CVE-2025-9410 – LostVIP Ruoyi-go SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-9410 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]
CVE-2025-57773 – DataEase JNDI Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-57773 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]
CVE-2025-57772 – DataEase H2 JDBC RCE Bypass
The following table lists the changes that have been made to the CVE-2025-57772 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]
CVE-2025-57760 – Langflow Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-57760 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]
CVE-2025-53120 – “Juniper Unified PAM Remote Code Execution via Path Traversal”
The following table lists the changes that have been made to the CVE-2025-53120 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]
CVE-2025-50722 – Apache Sparkshop Unauthenticated Remote Code Execution
The following table lists the changes that have been made to the CVE-2025-50722 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Aug. 25, 2025 Action Type […]