CVE-2024-13982 – SPON IP Network Broadcast System Arbitrary File Read Vulnerability

SPON IP Network Broadcast System, a digital audio transmission platform developed by SPON Communications, contains an arbitrary file read vulnerability in the rj_get_token.php endpoint. The flaw arises from insufficient input validation on the jsondata[url] parameter, which allows attackers to perform directory traversal and access sensitive files on the server. An unauthenticated remote attacker can exploit […]

CVE-2024-13981 – LiveBOS Arbitrary File Upload Vulnerability

LiveBOS, an object-oriented business architecture middleware suite developed by Apex Software Co., Ltd., contains an arbitrary file upload vulnerability in its UploadFile.do;.js.jsp endpoint. This flaw affects the LiveBOS Server component and allows unauthenticated remote attackers to upload crafted files outside the intended directory structure via path traversal in the filename parameter. Successful exploitation may lead […]

CVE-2024-13980 – H3C Intelligent Management Center Remote Command Execution Vulnerability

The following table lists the changes that have been made to the CVE-2024-13980 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2023-7309 – Dahua Smart Park Integrated Management Platform SOAP Path Traversal Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2023-7309 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2023-7308 – NSFOCUS SecGate3600 Authentication Bypass Information Disclosure

The following table lists the changes that have been made to the CVE-2023-7308 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2023-7307 – Sangfor Behavior Management System XXE Injection Vulnerability

The following table lists the changes that have been made to the CVE-2023-7307 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2018-25115 – D-Link DIR-series Router Privilege Escalation Remote Command Execution Vulnerability

Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. […]

CVE-2025-40779 – Kea DHCPv4 Assertion Failure Vulnerability

The following table lists the changes that have been made to the CVE-2025-40779 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2025-5101 – GitLab Code Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-5101 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2025-55582 – D-Link DCS-825L Persistent Privilege Escalation and Arbitrary Code Execution

D-Link DCS-825L firmware v1.08.01 contains a vulnerability in the watchdog script `mydlink-watch-dog.sh`, which blindly respawns binaries such as `dcp` and `signalc` without verifying integrity, authenticity, or permissions. An attacker with local filesystem access (via physical access, firmware modification, or debug interfaces) can replace these binaries with malicious payloads. The script executes these binaries as root […]