CVE-2025-23528 – DD Roles Privilege Escalation perms Vulnerability
The following table lists the changes that have been made to the CVE-2025-23528 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 16, 2025 Action […]
CVE-2024-55954 – OpenObserve Root User Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2024-55954 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 16, 2025 Action […]
CVE-2025-20630 – Mattermost Mobile Integericated Field Deserialization Crash
The following table lists the changes that have been made to the CVE-2025-20630 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 16, 2025 Action […]
CVE-2025-20621 – Mattermost Denial of Service (DoS)
The following table lists the changes that have been made to the CVE-2025-20621 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 16, 2025 Action […]
CVE-2024-57684 – D-Link DMZ Service Access Control Bypassomaly
The following table lists the changes that have been made to the CVE-2024-57684 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 16, 2025 Action […]
CVE-2024-57683 – D-Link Web-Enabled Router: Unauthenticated Filter Settings Tampering
The following table lists the changes that have been made to the CVE-2024-57683 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 16, 2025 Action […]
CVE-2024-57682 – D-Link D-Status ASP Information Disclosure
The following table lists the changes that have been made to the CVE-2024-57682 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 16, 2025 Action […]
CVE-2024-57681 – D-Link Form2alg.cgi Unauthenticated Command Injection
The following table lists the changes that have been made to the CVE-2024-57681 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 16, 2025 Action […]
CVE-2024-57680 – D-Link 816A2 Unauthenticated Port Triggers Access Control Bypass
The following table lists the changes that have been made to the CVE-2024-57680 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 16, 2025 Action […]
CVE-2024-57679 – D-Link 816A2 Access Control Bypass Allow Unauthorized Service Configuration
The following table lists the changes that have been made to the CVE-2024-57679 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 16, 2025 Action […]