CVE-2025-6737 – Securden Unified PAM Remote Vendor Gateway Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-6737 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]
CVE-2025-55575 – SMM Panel SQL Injection
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware. security cve exploit poc vulnerability Updated: 8 hours, 1 minute ago 7218 stars 1202 fork 1202 watcher Born at : Dec. 8, 2019, 1:03 p.m. This repo has been linked 805 different CVEs too.
CVE-2025-55409 – FoxCMS Cross Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2025-55409 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]
CVE-2025-53118 – “Accelera Unified PAM Authentication Bypass”
The following table lists the changes that have been made to the CVE-2025-53118 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]
CVE-2025-3478 – OpenText Enterprise Security Manager Stored XSS Vulnerability
The following table lists the changes that have been made to the CVE-2025-3478 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]
Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure
Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure In recent months, cybersecurity researchers have observed a surge in targeted campaigns by a sophisticated Chinese APT group leveraging commercial proxy and VPN services to mask their attack infrastru … Read more Published Date: Aug 25, 2025 (2 hours, 12 minutes ago) Vulnerabilities has been mentioned […]
CVE-2025-56214 – phpgurukul Hospital Management System SQL Injection
The following table lists the changes that have been made to the CVE-2025-56214 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Aug. 26, 2025 Action Type […]
CVE-2025-56216 – phpgurukul Hospital Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-56216 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]
CVE-2025-5302 – Llama Index JSONReader Recursive Denial of Service
The following table lists the changes that have been made to the CVE-2025-5302 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]
CVE-2025-53510 – SAIL Image Decoding Library Buffer Overflow
The following table lists the changes that have been made to the CVE-2025-53510 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 25, 2025 Action […]