CVE-2019-1815 – Cisco Meraki MX67/MX68 Local Status Page Unauthenticated Access to Sensitive Device Information Vulnerability
The following table lists the changes that have been made to the CVE-2019-1815 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
Windows KDC Proxy RCE Vulnerability Let Attackers Control The Server Remotely – Technical Analysis
Windows KDC Proxy RCE Vulnerability Let Attackers Control The Server Remotely – Technical Analysis Security researchers have uncovered a significant remote code execution vulnerability in Microsoft’s Windows Key Distribution Center (KDC) Proxy that could potentially allow attackers to gain complete … Read more Published Date: Mar 04, 2025 (1 hour, 10 minutes ago) Vulnerabilities has been mentioned […]
Cisco warns of Webex for BroadWorks flaw exposing credentials
Cisco warns of Webex for BroadWorks flaw exposing credentials Cisco warned customers today of a vulnerability in Webex for BroadWorks that could let unauthenticated attackers access credentials remotely. Webex for BroadWorks integrates Cisco Webex’s video confer … Read more Published Date: Mar 04, 2025 (1 hour, 12 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2023-20118
CVE-2024-41147 – Miniaudio FLAC Out-of-Bounds Write Vulnerability
The following table lists the changes that have been made to the CVE-2024-41147 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-10930 – Citrix DLL Hijacking Vulnerability
The following table lists the changes that have been made to the CVE-2024-10930 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27507 – Zitadel Insecure Direct Object Reference (IDOR) Vulnerability
The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. ZITADEL’s Admin API contains Insecure Direct Object Reference (IDOR) vulnerabilities that allow authenticated users, without specific IAM roles, to modify sensitive settings. While several endpoints are affected, the most critical vulnerability lies in the ability to manipulate LDAP configurations. Customers who do […]
CVE-2025-27402 – Tuleap CSRF Vulnerability
The following table lists the changes that have been made to the CVE-2025-27402 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27401 – Tuleap Report Filter Deletion Vulnerability
The following table lists the changes that have been made to the CVE-2025-27401 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27156 – Tuleap HTML Email Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-27156 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27155 – Pinecone Stored Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-27155 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.