CVE-2025-9491 – Microsoft Windows LNK File Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-9491 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]

CVE-2025-57425 – SourceCodester FAQ Management System Stored XSS Vulnerability

The following table lists the changes that have been made to the CVE-2025-57425 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]

CVE-2025-55212 – ImageMagick Denial of Service Vulnerability

The following table lists the changes that have been made to the CVE-2025-55212 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]

CVE-2025-52184 – Helpy.io Cross Site Scripting (XSS)

The following table lists the changes that have been made to the CVE-2025-52184 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]

CVE-2025-50974 – IPFire Calamaris Log Exporter Remote Code Execution

The Calamaris log exporter CGI (/cgi-bin/logs.cgi/calamaris.dat) in IPFire 2.29 does not properly sanitize user-supplied input before incorporating parameter values into a shell command. An unauthenticated remote attacker can inject arbitrary OS commands by embedding shell metacharacters in any of the following parameters BYTE_UNIT, DAY_BEGIN, DAY_END, HIST_LEVEL, MONTH_BEGIN, MONTH_END, NUM_CONTENT, NUM_DOMAINS, NUM_HOSTS, NUM_URLS, PERF_INTERVAL, YEAR_BEGIN, YEAR_END.

CVE-2025-36729 – “Fortinet Web Interface Unauthorized Access and Privilege Escalation”

The following table lists the changes that have been made to the CVE-2025-36729 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]

CVE-2025-2697 – IBM Cognos Command Center Open Redirect Vulnerability

The following table lists the changes that have been made to the CVE-2025-2697 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]

CVE-2025-1994 – IBM Cognos Command Center Deserialization Vulnerability

The following table lists the changes that have been made to the CVE-2025-1994 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]

CVE-2025-1494 – IBM Cognos Command Center Clickjacking Vulnerability

The following table lists the changes that have been made to the CVE-2025-1494 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]

CVE-2025-57813 – traP traQ Exposed OAuth Tokens in SQL Error Logs

The following table lists the changes that have been made to the CVE-2025-57813 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]