Critical OpenSSH Vulnerabilities Expose Users to MITM and DoS Attacks

Critical OpenSSH Vulnerabilities Expose Users to MITM and DoS Attacks Two critical OpenSSH vulnerabilities discovered! Qualys TRU finds client and server flaws (CVE-2025-26465 & CVE-2025-26466) enabling MITM and DoS. Upgrade to 9.9p2 now to protect your systems. Qualys … Read more Published Date: Feb 18, 2025 (17 hours, 40 minutes ago) Vulnerabilities has been mentioned in this […]

CVE-2024-55460 – BoardRoom Limited Dividend Distribution Tax Election System SQL Injection

The following table lists the changes that have been made to the CVE-2024-55460 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]

CVE-2024-39327 – Atos Eviden IDRA Access Control Weakness

The following table lists the changes that have been made to the CVE-2024-39327 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]

CVE-2025-22207 – Apache ComScheduler SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-22207 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]

CVE-2025-21703 – Linux Kernel netem Use-After-Free Vulnerability

The following table lists the changes that have been made to the CVE-2025-21703 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Feb. 18, 2025 Action Type […]

CVE-2025-21702 – Linux Kernel pfifo_head_drop Scheduler Qdisc Vulnerability

In the Linux kernel, the following vulnerability has been resolved: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 Expected behaviour: In case we reach scheduler’s limit, pfifo_tail_enqueue() will drop a packet in scheduler’s queue and decrease scheduler’s qlen by one. Then, pfifo_tail_enqueue() enqueue new packet and increase scheduler’s qlen by one. Finally, pfifo_tail_enqueue() return `NET_XMIT_CN` […]

CVE-2024-57050 – TP-Link WR840N Authentication Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2024-57050 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]

CVE-2024-57049 – TP-Link Archer c20 Authentication Bypass

The following table lists the changes that have been made to the CVE-2024-57049 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]

CVE-2024-57046 – Netgear DGN2200 Authentication Bypass

The following table lists the changes that have been made to the CVE-2024-57046 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]

CVE-2024-57045 – D-Link DIR-859 Authentication Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2024-57045 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]