CVE-2025-26528 – Apache Drupal Stored XSS
The following table lists the changes that have been made to the CVE-2025-26528 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 24, 2025 Action […]
CVE-2025-26527 – Apache Struts Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2025-26527 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 24, 2025 Action […]
CVE-2025-26525 – Adobe TeX Arbitrary File Read Vulnerability
The following table lists the changes that have been made to the CVE-2025-26525 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 24, 2025 Action […]
CVE-2025-27364 – Caldera Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-27364 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Feb. 24, 2025 Action Type […]
CVE-2025-27133 – WeGIA SQL Injection
The following table lists the changes that have been made to the CVE-2025-27133 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 24, 2025 Action […]
CVE-2025-27112 – Navidrome Subsonic API Authentication Bypass
Navidrome is an open source web-based music collection server and streamer. Starting in version 0.52.0 and prior to version 0.54.5, in certain Subsonic API endpoints, a flaw in the authentication check process allows an attacker to specify any arbitrary username that does not exist on the system, along with a salted hash of an empty […]
CVE-2024-57026 – TawkTo Widget Cross Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2024-57026 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 24, 2025 Action […]
CVE-2024-54820 – XOne Web Monitor SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2024-54820 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 24, 2025 Action […]
Threat Actors Stealing Users Browser Fingerprints To Bypass Security Measures & Impersonate Users
Threat Actors Stealing Users Browser Fingerprints To Bypass Security Measures & Impersonate Users A sophisticated cybercriminal campaign leveraging stolen browser fingerprints to bypass fraud detection systems and impersonate legitimate users has been uncovered by cybersecurity researchers. Dubbed … Read more Published Date: Feb 24, 2025 (3 hours, 15 minutes ago) Vulnerabilities has been mentioned in this article. […]
CVE-2025-26200 – SLIMS SQL Injection Privilege Escalation
The following table lists the changes that have been made to the CVE-2025-26200 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 24, 2025 Action […]