CVE-2024-12284 in NetScaler Console Exposes Systems to Unauthorized Command Execution

CVE-2024-12284 in NetScaler Console Exposes Systems to Unauthorized Command Execution Cloud Software Group has released a security bulletin addressing a high-severity vulnerability in its NetScaler Console and NetScaler Agent. Tracked as CVE-2024-12284, the flaw could allow authenticat … Read more Published Date: Feb 19, 2025 (2 hours, 18 minutes ago) Vulnerabilities has been mentioned in this article. […]

CVE-2025-25943 – Bento4 Buffer Overflow Arbitrary Code Execution

The following table lists the changes that have been made to the CVE-2025-25943 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]

CVE-2025-27092 – GHOSTS Path Traversal Vulnerability

GHOSTS is an open source user simulation framework for cyber experimentation, simulation, training, and exercise. A path traversal vulnerability was discovered in GHOSTS version 8.0.0.0 that allows an attacker to access files outside of the intended directory through the photo retrieval endpoint. The vulnerability exists in the /api/npcs/{id}/photo endpoint, which is designed to serve profile […]

CVE-2025-25947 – Bento4 Segmentation Fault in MP4 File Processing

The following table lists the changes that have been made to the CVE-2025-25947 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]

CVE-2025-25946 – Bento4 Memory Leak

The following table lists the changes that have been made to the CVE-2025-25946 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]

CVE-2025-25945 – Bento4 Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2025-25945 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]

CVE-2025-25944 – Bento4 Buffer Overflow Arbitrary Code Execution

The following table lists the changes that have been made to the CVE-2025-25944 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]

CVE-2025-25942 – Bento4 Memory Leak

The following table lists the changes that have been made to the CVE-2025-25942 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]

CVE-2025-24989 – Microsoft Power Pages Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-24989 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]

CVE-2025-21355 – Microsoft Bing Remote Code Execution

The following table lists the changes that have been made to the CVE-2025-21355 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]