CVE-2025-25876 – ITSourcecode Simple ChatBox SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-25876 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 21, 2025 Action […]
CVE-2025-25875 – ITSourcecode Simple ChatBox SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-25875 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 21, 2025 Action […]
CVE-2025-25766 – MRCMS Remote Code Execution
The following table lists the changes that have been made to the CVE-2025-25766 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 21, 2025 Action […]
CVE-2025-25765 – MRCMS Unauthenticated Arbitrary File Write Vulnerability
The following table lists the changes that have been made to the CVE-2025-25765 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 21, 2025 Action […]
CVE-2024-57176 – White-Jotter Directory Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2024-57176 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 21, 2025 Action […]
CVE-2024-55159 – GFast SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2024-55159 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 21, 2025 Action […]
CVE-2024-55156 – Apache CloudEvents Java SDK XXE Injection
The following table lists the changes that have been made to the CVE-2024-55156 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 21, 2025 Action […]
Cisco Confirms Salt Typhoon Exploitation in Telecom Hits
Cisco Confirms Salt Typhoon Exploitation in Telecom Hits Source: Geopix / Alamy Stock PhotoNEWS BRIEFFollowing research reports last week that Salt Typhoon, the Chinese threat actor known for spying on communications networks, exploited a Cisco vulnerabilit … Read more Published Date: Feb 21, 2025 (3 hours, 10 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-20399 […]
CVE-2025-25505 – Tenda AC6 Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-25505 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 21, 2025 Action […]
CVE-2025-26014 – Loggrove Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-26014 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 21, 2025 Action […]