CVE-2025-26318 – TSplus Remote Access Domain Account Disclosure
The following table lists the changes that have been made to the CVE-2025-26318 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1955 – Code-projects Online Class and Exam Scheduling System Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-1955 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1954 – PHPGurukul Human Metapneumovirus Testing Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-1954 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-9135 – Arista EOS BGP Link State Memory Leak Vulnerability
The following table lists the changes that have been made to the CVE-2024-9135 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-8000 – Arista EOS 802.1X Dynamic ACL Installation Vulnerability
The following table lists the changes that have been made to the CVE-2024-8000 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2021-41719 – Maharashtra State Electricity Distribution Company Limited Mahavitran IOS Application Insecure GET Request Transmission
The following table lists the changes that have been made to the CVE-2021-41719 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2020-23438 – Wondershare Filmora Trojan Dll Hijacking Privilege Escalation
The following table lists the changes that have been made to the CVE-2020-23438 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
Serbian Police Hack Protester’s Phone With Cellebrite Exploit Chain
Serbian Police Hack Protester’s Phone With Cellebrite Exploit Chain Source: Dejan Krsmanovic via Alamy Stock PhotoSerbian law enforcement officials are using a Cellebrite mobile “information extraction” product in tandem with an exploit chain to target dissidents, inc … Read more Published Date: Mar 04, 2025 (2 hours, 46 minutes ago) Vulnerabilities has been mentioned in this article. […]
CVE-2025-1953 – “AIBrix Prefix Caching Insufficiently Random Values Vulnerability”
The following table lists the changes that have been made to the CVE-2025-1953 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1260 – Arista EOS OpenConfig gNOI Request Validation Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-1260 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.