CVE-2025-27150 – Tuleap Redis Password Disclosure
The following table lists the changes that have been made to the CVE-2025-27150 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-26182 – Xylophone Novel Plus Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-26182 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-26091 – TeamPasswordManager XSS
The following table lists the changes that have been made to the CVE-2025-26091 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-43639: Remote Code Execution in Microsoft Windows KDC Proxy
CVE-2024-43639: Remote Code Execution in Microsoft Windows KDC Proxy In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Simon Humbert and Guy Lederfein of the Trend Micro Research Team detail a recently patched code execution vulnerab … Read more Published Date: Mar 04, 2025 (2 hours, 50 minutes ago) Vulnerabilities has been mentioned in […]
CVE-2025-26320 – BroadlinkManager OS Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-26320 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27111 – Rack Log Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-27111 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-23368 – Wildfly Elytron Authentication Brute Force Vulnerability
The following table lists the changes that have been made to the CVE-2025-23368 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1425 – PocketBook InkPad Color 3 Sudo Privilege Escalation
The following table lists the changes that have been made to the CVE-2025-1425 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1424 – PocketBook InkPad Color 3 Root Privilege Escalation
The following table lists the changes that have been made to the CVE-2025-1424 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-50707 – Uniguest Tripleplay Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2024-50707 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.