CVE-2024-56771 – “Winvic Spinand Linux Kernel ECC Information Faking”
In the Linux kernel, the following vulnerability has been resolved: mtd: spinand: winbond: Fix 512GW, 01GW, 01JW and 02JW ECC information These four chips: * W25N512GW * W25N01GW * W25N01JW * W25N02JW all require a single bit of ECC strength and thus feature an on-die Hamming-like ECC engine. There is no point in filling a […]
CVE-2024-51442 – Minidlna Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2024-51442 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 08, 2025 Action […]
CVE-2023-35685 – Vulnerability Title: Red Hat Kernel Devicemem Server Physical Page UAF
The following table lists the changes that have been made to the CVE-2023-35685 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 08, 2025 Action […]
CVE-2025-20168 – Cisco Common Services Platform Collector Critical XSS Vulnerability
The following table lists the changes that have been made to the CVE-2025-20168 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 08, 2025 Action […]
CVE-2025-20167 – Cisco Common Services Platform Collector Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-20167 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 08, 2025 Action […]
CVE-2025-20166 – Cisco CSPC Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-20166 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 08, 2025 Action […]
CVE-2024-56770 – Linux Netem Qdisc Accounting Backlog Vulnerability
In the Linux kernel, the following vulnerability has been resolved: net/sched: netem: account for backlog updates from child qdisc In general, ‘qlen’ of any classful qdisc should keep track of the number of packets that the qdisc itself and all of its children holds. In case of netem, ‘qlen’ only accounts for the packets in […]
CVE-2024-55459 – Apache Keras Arbitrary File Write Vulnerability
The following table lists the changes that have been made to the CVE-2024-55459 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 08, 2025 Action […]
CVE-2024-13187 – Kingsoft WPS Office TCC Handler Code Injection Vulnerability
The following table lists the changes that have been made to the CVE-2024-13187 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 08, 2025 Action […]
ZDI Threat Hunting 2024: Highlights, Trends, & Challenges
ZDI Threat Hunting 2024: Highlights, Trends, & Challenges Reflecting on 2024, it has been an eventful year for the Zero Day Initiative Threat Hunting team. Throughout the year, we identified numerous threat actor campaigns exploiting zero-day vulnerabilities … Read more Published Date: Jan 08, 2025 (1 hour, 38 minutes ago) Vulnerabilities has been mentioned in this article.