Windows KDC Proxy RCE Vulnerability Let Attackers Control The Server Remotely – Technical Analysis

Windows KDC Proxy RCE Vulnerability Let Attackers Control The Server Remotely – Technical Analysis Security researchers have uncovered a significant remote code execution vulnerability in Microsoft’s Windows Key Distribution Center (KDC) Proxy that could potentially allow attackers to gain complete … Read more Published Date: Mar 04, 2025 (1 hour, 10 minutes ago) Vulnerabilities has been mentioned […]

Cisco warns of Webex for BroadWorks flaw exposing credentials

Cisco warns of Webex for BroadWorks flaw exposing credentials Cisco warned customers today of a vulnerability in Webex for BroadWorks that could let unauthenticated attackers access credentials remotely. Webex for BroadWorks integrates Cisco Webex’s video confer … Read more Published Date: Mar 04, 2025 (1 hour, 12 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2023-20118

CVE-2024-41147 – Miniaudio FLAC Out-of-Bounds Write Vulnerability

The following table lists the changes that have been made to the CVE-2024-41147 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2024-10930 – Citrix DLL Hijacking Vulnerability

The following table lists the changes that have been made to the CVE-2024-10930 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-27507 – Zitadel Insecure Direct Object Reference (IDOR) Vulnerability

The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. ZITADEL’s Admin API contains Insecure Direct Object Reference (IDOR) vulnerabilities that allow authenticated users, without specific IAM roles, to modify sensitive settings. While several endpoints are affected, the most critical vulnerability lies in the ability to manipulate LDAP configurations. Customers who do […]

CVE-2025-27402 – Tuleap CSRF Vulnerability

The following table lists the changes that have been made to the CVE-2025-27402 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-27401 – Tuleap Report Filter Deletion Vulnerability

The following table lists the changes that have been made to the CVE-2025-27401 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-27156 – Tuleap HTML Email Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-27156 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-27155 – Pinecone Stored Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-27155 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.