CVE-2025-25305 – Home Assistant Core SSL Verification Bypass
The following table lists the changes that have been made to the CVE-2025-25305 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]
CVE-2025-25284 – ZOO-Project WPS Path Traversal Vulnerability
The ZOO-Project is an open source processing platform, released under MIT/X11 Licence. A vulnerability in ZOO-Project’s WPS (Web Processing Service) implementation allows unauthorized access to files outside the intended directory through path traversal. Specifically, the Gdal_Translate service, when processing VRT (Virtual Format) files, does not properly validate file paths referenced in the VRTRasterBand element, allowing […]
CVE-2025-24895 – CIE.AspNetCore.Authentication SAML Signature Forgery
CIE.AspNetCore.Authentication is an AspNetCore Remote Authenticator for CIE 3.0. Authentication using Spid and CIE is based on the SAML2 standard which provides two entities: 1. Identity Provider (IDP): the system that authenticates users and provides identity information (SAML affirmation) to the Service Provider, in essence, is responsible for the management of the credentials and identity […]
CVE-2025-24894 – “SPID.AspNetCore.Authentication SAML Signature Forgery Vulnerability”
SPID.AspNetCore.Authentication is an AspNetCore Remote Authenticator for SPID. Authentication using Spid and CIE is based on the SAML2 standard which provides two entities: Identity Provider (IDP): the system that authenticates users and provides identity information (SAML affirmation) to the Service Provider, in essence, is responsible for the management of the credentials and identity of users; […]
CVE-2025-21608 – Meshtastic MQTT PKC Decoding Vulnerability (Authentication Bypass)
The following table lists the changes that have been made to the CVE-2025-21608 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]
CVE-2024-57056 – WombatDialer Session Impersonation Vulnerability
The following table lists the changes that have been made to the CVE-2024-57056 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]
CVE-2024-57055 – WombatDialer Server-Side Access Control Bypass
The following table lists the changes that have been made to the CVE-2024-57055 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]
CVE-2024-45774 – Grub2 JPEG Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2024-45774 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]
CVE-2025-26620 – Duende.AccessTokenManagement OAuth Token Spoofing Vulnerability
Duende.AccessTokenManagement is a set of .NET libraries that manage OAuth and OpenId Connect access tokens. Duende.AccessTokenManagement contains a race condition when requesting access tokens using the client credentials flow. Concurrent requests to obtain an access token using differing protocol parameters can return access tokens obtained with the wrong scope, resource indicator, or other protocol parameters. […]
CVE-2025-26058 – Webkul QloApps Authentication Token Exposur
The following table lists the changes that have been made to the CVE-2025-26058 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]