CVE-2025-1215 – Vim Local Log Memory Corruption Vulnerability
The following table lists the changes that have been made to the CVE-2025-1215 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Feb. 12, 2025 Action Type […]
CVE-2025-1146 – CrowdStrike Falcon TLS Man-in-the-Middle Vulnerability
CrowdStrike uses industry-standard TLS (transport layer security) to secure communications from the Falcon sensor to the CrowdStrike cloud. CrowdStrike has identified a validation logic error in the Falcon sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor where our TLS connection routine to the CrowdStrike cloud can incorrectly process server certificate validation. This […]
CVE-2025-0937 – Nomad Event Stream Namespace Bypass (Information Disclosure)
The following table lists the changes that have been made to the CVE-2025-0937 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]
CVE-2025-25200 – Koa HTTP Header Regular Expression Denial-of-Service Vulnerability
Koa is expressive middleware for Node.js using ES2017 async functions. Prior to versions 0.21.2, 1.7.1, 2.15.4, and 3.0.0-alpha.3, Koa uses an evil regex to parse the `X-Forwarded-Proto` and `X-Forwarded-Host` HTTP headers. This can be exploited to carry out a Denial-of-Service attack. Versions 0.21.2, 1.7.1, 2.15.4, and 3.0.0-alpha.3 fix the issue.
CVE-2025-25741 – D-Link DIR-853 IPv6 Pppoe Password Stack-Based Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-25741 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]
CVE-2025-25199 – Microsoft Go-crypto Winnative: Unreleased Key Handle Memory Leak
The following table lists the changes that have been made to the CVE-2025-25199 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]
CVE-2025-25198 – Mailcow: Dockerized Host Header Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-25198 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]
CVE-2025-1214 – PiHome Role-Based Access Control Missing Authorization Remote Vulnerability
The following table lists the changes that have been made to the CVE-2025-1214 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]
CVE-2025-1213 – PiHome Cross Site Scripting (XSS) Vulnerability
The following table lists the changes that have been made to the CVE-2025-1213 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]
CVE-2024-6097 – Telerik Reporting Absolute Path Information Disclosure
The following table lists the changes that have been made to the CVE-2024-6097 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 12, 2025 Action […]