CVE-2025-55476 – FireShare FileShare SQL Injection
The following table lists the changes that have been made to the CVE-2025-55476 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 02, 2025 Action […]
CVE-2025-32100 – Samsung Exynos Buffer Overflow Vulnerability
An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. A programming mistake for buffer copy leads to out-of-bounds writes via malformed ROHC packets.
CVE-2025-32098 – Samsung Magician Elevation of Privileges Vulnerability
The following table lists the changes that have been made to the CVE-2025-32098 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 02, 2025 Action […]
CVE-2025-9828 – Tenda CP6 Remote Difficult Cryptographic Algorithm Vulnerability
The following table lists the changes that have been made to the CVE-2025-9828 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 02, 2025 Action […]
CVE-2025-55474 – Many Notes Cross Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2025-55474 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 02, 2025 Action […]
CVE-2025-9696 – SunPower PVS6 BluetoothLE Insecure Encryption Vulnerability
The SunPower PVS6’s BluetoothLE interface is vulnerable due to its use of hardcoded encryption parameters and publicly accessible protocol details. An attacker within Bluetooth range could exploit this vulnerability to gain full access to the device’s servicing interface. This access allows the attacker to perform actions such as firmware replacement, disabling power production, modifying grid […]
CVE-2025-55473 – Asian Arts Talents Foundation (AATF) Website Docker XSS
The following table lists the changes that have been made to the CVE-2025-55473 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 02, 2025 Action […]
CVE-2025-55472 – Tirreno SQL Injection
The following table lists the changes that have been made to the CVE-2025-55472 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 02, 2025 Action […]
CVE-2025-55373 – Beakon Application Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-55373 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 02, 2025 Action […]
CVE-2025-57616 – FFmpeg Use-After-Free Vulnerability
Affected Products The following products are affected by CVE-2025-57616 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below. No affected product recoded yet