CVE-2025-27089 – Directus Unintended Field Update Vulnerability

Directus is a real-time API and App dashboard for managing SQL database content. In affected versions if there are two overlapping policies for the `update` action that allow access to different fields, instead of correctly checking access permissions against the item they apply for the user is allowed to update the superset of fields allowed […]

CVE-2025-24965 – Crun Container Runtime File System Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-24965 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]

CVE-2025-1426 – Google Chrome Android GPU Heap Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-1426 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]

CVE-2025-1006 – Google Chrome Use After Free in Network

The following table lists the changes that have been made to the CVE-2025-1006 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]

CVE-2024-52541 – Dell Client Platform BIOS Weak Authentication Elevation of Privilege Vulnerability

The following table lists the changes that have been made to the CVE-2024-52541 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]

CVE-2025-0999 – Google Chrome Heap Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-0999 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]

CVE-2023-47160 – IBM Cognos Controller XXE Injection Vulnerability

The following table lists the changes that have been made to the CVE-2023-47160 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]

Patch Now: CISA Warns of Palo Alto Flaw Exploited in the Wild

Patch Now: CISA Warns of Palo Alto Flaw Exploited in the Wild Source: Chiew via ShutterstockAttackers are actively exploiting an authentication bypass flaw found in the Palo Alto Networks PAN-OS software that lets an unauthenticated attacker bypass authenticatio … Read more Published Date: Feb 19, 2025 (3 hours, 12 minutes ago) Vulnerabilities has been mentioned in this […]

CVE-2025-20211 – Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-20211 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]

CVE-2025-20158 – Cisco Video Phone 8875 and Cisco Desk Phone 9800 Series SSH Debug Shell Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2025-20158 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 19, 2025 Action […]