CVE-2024-45426 – Zoom Workplace Apps Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2024-45426 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]
CVE-2024-45425 – Zoom Workplace Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2024-45425 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]
CVE-2024-45424 – Zoom Workplace App Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2024-45424 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]
CVE-2024-45418 – Zoom macOS Symlink Path Traversal Privilege Escalation
The following table lists the changes that have been made to the CVE-2024-45418 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]
CVE-2024-45417 – Zoom macOS Installer Resource Consumption Vulnerability
The following table lists the changes that have been made to the CVE-2024-45417 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]
CVE-2024-45421 – Zoom Buffer Overflow Privilege Escalation
The following table lists the changes that have been made to the CVE-2024-45421 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]
CVE-2025-27135 – RAGFlow SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-27135 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]
CVE-2024-36259 – Odoo Community Oracle-based Sensitive Information Extraction Vulnerability
The following table lists the changes that have been made to the CVE-2024-36259 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]
CVE-2025-25192 – “GLPI Debug Mode Information Disclosure”
The following table lists the changes that have been made to the CVE-2025-25192 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]
CVE-2025-23046 – GLPI OAuth Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-23046 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]