CVE-2025-52494 – Adacore Ada Web Server (AWS) TLS ClientHello Message DoS

Adacore Ada Web Server (AWS) before 25.2 is vulnerable to a denial-of-service (DoS) condition due to improper handling of SSL handshakes during connection initialization. When a client initiates an HTTPS connection, the server performs the SSL handshake before assigning the connection to a processing slot. However, there is no specific timeout set for this phase, […]

CVE-2025-45805 – “PhpGurukul Doctor Appointment Management System Cross-Site Scripting (XSS)”

The following table lists the changes that have been made to the CVE-2025-45805 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 03, 2025 Action […]

CVE-2025-20336 – Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 Directory Permissions Information Disclosure

The following table lists the changes that have been made to the CVE-2025-20336 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 03, 2025 Action […]

CVE-2025-20335 – Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 Unauthenticated Remote File Write Vulnerability

The following table lists the changes that have been made to the CVE-2025-20335 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 03, 2025 Action […]

CVE-2025-20330 – Cisco Unified Communications Manager IM & Presence Service Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-20330 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 03, 2025 Action […]

CVE-2025-20328 – Cisco Webex Meetings Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-20328 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 03, 2025 Action […]

CVE-2025-20326 – Cisco Unified Communications Manager CSRF Vulnerability

The following table lists the changes that have been made to the CVE-2025-20326 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 03, 2025 Action […]

CVE-2025-20291 – “Cisco Webex Meetings URL Redirection Vulnerability”

The following table lists the changes that have been made to the CVE-2025-20291 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 03, 2025 Action […]

CVE-2025-20287 – Cisco EPNM File Upload Arbitrary File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2025-20287 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 03, 2025 Action […]