CVE-2023-46272 – Extreme Networks IQ Engine Buffer Overflow
The following table lists the changes that have been made to the CVE-2023-46272 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]
CVE-2023-46271 – Extreme Networks IQ Engine Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2023-46271 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]
CVE-2020-35546 – Lexmark MX6500 LW75 Printer Incorrect Access Control Vulnerability
The following table lists the changes that have been made to the CVE-2020-35546 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]
CVE-2020-13481 – Lexmark Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2020-13481 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]
CVE-2025-24806 – Authelia Brute-Force Regulation Limitation Vulnerability
The following table lists the changes that have been made to the CVE-2025-24806 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]
CVE-2025-1118 – Grub2 Information Disclosure
The following table lists the changes that have been made to the CVE-2025-1118 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]
CVE-2025-0893 – Symantec Diagnostic Tool (SymDiag) Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-0893 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]
CVE-2024-53974 – Adobe Experience Manager Stored Cross-Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2024-53974 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]
CVE-2024-45777 – Grub2 Out-of-bound Write Vulnerability
The following table lists the changes that have been made to the CVE-2024-45777 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]
CVE-2020-10095 – Lexmark CSRF Configuration Hijacking
The following table lists the changes that have been made to the CVE-2020-10095 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]