CVE-2025-27150 – Tuleap Redis Password Disclosure

The following table lists the changes that have been made to the CVE-2025-27150 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-26182 – Xylophone Novel Plus Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-26182 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-26091 – TeamPasswordManager XSS

The following table lists the changes that have been made to the CVE-2025-26091 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2024-43639: Remote Code Execution in Microsoft Windows KDC Proxy

CVE-2024-43639: Remote Code Execution in Microsoft Windows KDC Proxy In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Simon Humbert and Guy Lederfein of the Trend Micro Research Team detail a recently patched code execution vulnerab … Read more Published Date: Mar 04, 2025 (2 hours, 50 minutes ago) Vulnerabilities has been mentioned in […]

CVE-2025-26320 – BroadlinkManager OS Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-26320 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-27111 – Rack Log Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-27111 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-23368 – Wildfly Elytron Authentication Brute Force Vulnerability

The following table lists the changes that have been made to the CVE-2025-23368 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-1425 – PocketBook InkPad Color 3 Sudo Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-1425 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-1424 – PocketBook InkPad Color 3 Root Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-1424 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2024-50707 – Uniguest Tripleplay Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2024-50707 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.