CVE-2025-13338 – Apache HTTP Server Cross-Site Scripting
The following table lists the changes that have been made to the CVE-2025-13338 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Nov. 27, 2025 Action Type […]
CVE-2025-12421 – Account Takeover via Code Exchange Endpoint
The following table lists the changes that have been made to the CVE-2025-12421 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 27, 2025 Action […]
CVE-2025-3261 – Stored Cross-Site Scripting (XSS) in ThingsBoard
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the “Image Gallery”, leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` […]
CVE-2025-12559 – Information Disclosure in Common Teams API
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
CVE-2025-13765 – Devolutions Server Unsecured Email Credentials Exposure
The following table lists the changes that have been made to the CVE-2025-13765 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 27, 2025 Action […]
CVE-2025-13758 – Devolutions Server Exposed Credentials Vulnerability
The following table lists the changes that have been made to the CVE-2025-13758 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 27, 2025 Action […]
CVE-2025-13757 – Devolutions Server SQL Injection
The following table lists the changes that have been made to the CVE-2025-13757 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 27, 2025 Action […]
CVE-2025-12419 – Account takeover on OAuth/OpenID-enabled servers
The following table lists the changes that have been made to the CVE-2025-12419 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 27, 2025 Action […]
NVIDIA DGX Spark Vulnerabilities Let Attackers Execute Malicious Code and DoS Attacks
NVIDIA DGX Spark Vulnerabilities Let Attackers Execute Malicious Code and DoS Attacks An urgent security update for its DGX Spark AI workstation after discovering 14 vulnerabilities in the system’s firmware that could allow attackers to execute malicious code and launch denial-of-servi … Read more Published Date: Nov 27, 2025 (3 hours ago) Vulnerabilities has been mentioned […]
CVE-2025-8890 – Authenticated RCE in SDMC NE6037 router
The following table lists the changes that have been made to the CVE-2025-8890 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 27, 2025 Action […]