CVE-2024-50691 – SunGrow iSolarCloud Man-in-the-Middle Attack

The following table lists the changes that have been made to the CVE-2024-50691 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 26, 2025 Action […]

CVE-2024-50689 – SunGrow iSolarCloud IDOR Vulnerability

The following table lists the changes that have been made to the CVE-2024-50689 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 26, 2025 Action […]

CVE-2024-50688 – SunGrow iSolarCloud Hardcoded Credentials Vulnerability

The following table lists the changes that have been made to the CVE-2024-50688 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 26, 2025 Action […]

CVE-2024-50687 – SunGrow iSolarCloud IDOR

The following table lists the changes that have been made to the CVE-2024-50687 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 26, 2025 Action […]

CVE-2024-50686 – SunGrow iSolarCloud IDOR

The following table lists the changes that have been made to the CVE-2024-50686 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 26, 2025 Action […]

CVE-2025-1726 – Esri ArcGIS Monitor SQL Injection

The following table lists the changes that have been made to the CVE-2025-1726 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 26, 2025 Action […]

Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites

Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites A cross-site scripting (XSS) vulnerability in a virtual tour framework has been weaponized by malicious actors to inject malicious scripts across hundreds of websites with the goal of manipulating sea … Read more Published Date: Feb 26, 2025 (3 hours, 1 minute ago) Vulnerabilities has […]

CVE-2025-20161 – Cisco Nexus 3000/9000 Series Switches NX-OS Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-20161 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 26, 2025 Action […]

CVE-2025-20118 – Cisco APIC Sensitive Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2025-20118 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by [email protected] Feb. 26, 2025 Action Type […]

CVE-2025-20117 – Cisco APIC CLI Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-20117 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 26, 2025 Action […]