CVE-2024-45584 – Apache Wireless Router Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2024-45584 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]

CVE-2024-45582 – “Canon Camera Kernel Buffer Overflow”

The following table lists the changes that have been made to the CVE-2024-45582 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]

CVE-2024-45573 – Windows Adobe Flash Buffer Overflow

The following table lists the changes that have been made to the CVE-2024-45573 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]

CVE-2024-45571 – Cisco WLAN WMI Command Memory Corruption

The following table lists the changes that have been made to the CVE-2024-45571 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]

CVE-2024-45569 – Apache Stratosphere XGBoost Memory Corruption Remote Code Execution

The following table lists the changes that have been made to the CVE-2024-45569 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]

CVE-2024-45561 – Cisco Infineon SDK IOCTL Memory Corruption Vulnerability

The following table lists the changes that have been made to the CVE-2024-45561 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]

CVE-2024-45560 – Adobe Flash Memory Corruption Vulnerability

The following table lists the changes that have been made to the CVE-2024-45560 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]

CVE-2024-38418 – VMware ESXi IOCTL Memory Corruption

CVE ID : CVE-2024-38418 Published : Feb. 3, 2025, 5:15 p.m. | 1 hour, 8 minutes ago Description : Memory corruption while parsing the memory map info in IOCTL calls. Severity: 7.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE-2024-38420 – VMware ESXi Integer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2024-38420 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]

CVE-2025-24707 – GT3 Photo Gallery Cross-Site Scripting (XSS)

The following table lists the changes that have been made to the CVE-2025-24707 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 03, 2025 Action […]