CVE-2025-0143 – Zoom Workplace App for Linux Out-of-Bounds Write Denial of Service

The following table lists the changes that have been made to the CVE-2025-0143 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 30, 2025 Action […]

CVE-2025-0142 – Zoom Jenkins Marketplace Clear Text Storage Information Disclosure

The following table lists the changes that have been made to the CVE-2025-0142 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 30, 2025 Action […]

CVE-2024-10604 – Fuchsia Network Protocol Header Field Guessing Vulnerability

The following table lists the changes that have been made to the CVE-2024-10604 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 30, 2025 Action […]

CVE-2024-10603 – Google gVisor TCP/UDP Predictable Header Values

The following table lists the changes that have been made to the CVE-2024-10603 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 30, 2025 Action […]

CVE-2024-10026 – Google gVisor ID Tracking Vulnerability

The following table lists the changes that have been made to the CVE-2024-10026 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 30, 2025 Action […]

CVE-2025-24507 – Cisco Network Appliance Boot Time Root Access

The following table lists the changes that have been made to the CVE-2025-24507 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 30, 2025 Action […]

CVE-2025-24506 – Bitdefender PAM Information Disclosure

The following table lists the changes that have been made to the CVE-2025-24506 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Jan. 30, 2025 Action Type […]

CVE-2025-24505 – Apache PAM Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-24505 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Jan. 30, 2025 Action Type […]

CVE-2025-24504 – Apache Struts CSRF Log Injection

The following table lists the changes that have been made to the CVE-2025-24504 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 30, 2025 Action […]