CVE-2025-23236 – Cisco Defense Platform Home Edition Buffer Overflow Elevates Privileges
The following table lists the changes that have been made to the CVE-2025-23236 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-20094 – Microsoft Defense Platform Windows RCE (Shatter)
The following table lists the changes that have been made to the CVE-2025-20094 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
Cisco Patches Critical ISE Vulnerabilities Enabling Root CmdExec and PrivEsc
Cisco Patches Critical ISE Vulnerabilities Enabling Root CmdExec and PrivEsc Cisco has released updates to address two critical security flaws Identity Services Engine (ISE) that could allow remote attackers to execute arbitrary commands and elevate privileges on susceptible d … Read more Published Date: Feb 06, 2025 (4 hours, 6 minutes ago) Vulnerabilities has been mentioned in […]
CVE-2025-22890 – Defense Platform Home Edition Elevation of Privilege Vulnerability
The following table lists the changes that have been made to the CVE-2025-22890 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 06, 2025 Action […]
CVE-2024-13487 – “WooCommerce CURCY Arbitrary Shortcode Execution Vulnerability”
CVE ID : CVE-2024-13487 Published : Feb. 6, 2025, 7:15 a.m. | 1 hour, 58 minutes ago Description : The The CURCY – Multi Currency for WooCommerce – The best free currency exchange plugin – Run smoothly on WooCommerce 9.x plugin for WordPress is vulnerable to arbitrary shortcode execution via the get_products_price() function in all versions up […]
CVE-2025-0522 – LikeBot CSRF Stored XSS
CVE ID : CVE-2025-0522 Published : Feb. 6, 2025, 6:15 a.m. | 58 minutes ago Description : The LikeBot WordPress plugin through 0.85 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack. […]
CVE-2024-53104 Linux Kernel Flaw Added to CISA’s KEV Catalog
CVE-2024-53104 Linux Kernel Flaw Added to CISA’s KEV Catalog On February 5, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2024-53104 to its Known Exploited Vulnerabilities (KEV) Catalog. This addition highlights the critical nature … Read more Published Date: Feb 06, 2025 (3 hours, 45 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-23114 CVE-2025-21293 […]
CVE-2024-51547 – ABB ASPECT-Enterprise/NEXUS Series/MATRIX Series Hard-coded Credentials Vulnerability
The following table lists the changes that have been made to the CVE-2024-51547 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-0799 – IBM App Connect Enterprise Path Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-0799 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 06, 2025 Action […]
CVE-2024-51450 – IBM Security Verify Directory Command Injection
The following table lists the changes that have been made to the CVE-2024-51450 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 06, 2025 Action […]