CVE-2025-13338 – Apache HTTP Server Cross-Site Scripting

The following table lists the changes that have been made to the CVE-2025-13338 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Nov. 27, 2025 Action Type […]

CVE-2025-12421 – Account Takeover via Code Exchange Endpoint

The following table lists the changes that have been made to the CVE-2025-12421 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 27, 2025 Action […]

CVE-2025-3261 – Stored Cross-Site Scripting (XSS) in ThingsBoard

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the “Image Gallery”, leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` […]

CVE-2025-12559 – Information Disclosure in Common Teams API

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

CVE-2025-13765 – Devolutions Server Unsecured Email Credentials Exposure

The following table lists the changes that have been made to the CVE-2025-13765 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 27, 2025 Action […]

CVE-2025-13758 – Devolutions Server Exposed Credentials Vulnerability

The following table lists the changes that have been made to the CVE-2025-13758 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 27, 2025 Action […]

CVE-2025-13757 – Devolutions Server SQL Injection

The following table lists the changes that have been made to the CVE-2025-13757 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 27, 2025 Action […]

CVE-2025-12419 – Account takeover on OAuth/OpenID-enabled servers

The following table lists the changes that have been made to the CVE-2025-12419 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 27, 2025 Action […]

NVIDIA DGX Spark Vulnerabilities Let Attackers Execute Malicious Code and DoS Attacks

NVIDIA DGX Spark Vulnerabilities Let Attackers Execute Malicious Code and DoS Attacks An urgent security update for its DGX Spark AI workstation after discovering 14 vulnerabilities in the system’s firmware that could allow attackers to execute malicious code and launch denial-of-servi … Read more Published Date: Nov 27, 2025 (3 hours ago) Vulnerabilities has been mentioned […]

CVE-2025-8890 – Authenticated RCE in SDMC NE6037 router

The following table lists the changes that have been made to the CVE-2025-8890 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 27, 2025 Action […]