CVE-2024-57174 – Alphion ASEE-1443 DNS Suffix Misconfiguration Vulnerability

The following table lists the changes that have been made to the CVE-2024-57174 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]

CVE-2024-51144 – Ampache CSRF Vulnerability

The following table lists the changes that have been made to the CVE-2024-51144 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]

CVE-2025-27517 – “Volt Livewire Remote Code Execution Vulnerability”

The following table lists the changes that have been made to the CVE-2025-27517 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]

Qualcomm, MediaTek Release Security Fix Bonanza

Qualcomm, MediaTek Release Security Fix Bonanza Source: Andriy Popov via Alamy Stock PhotoNEWS BRIEFQualcomm and MediaTek, two semiconductor companies, have disclosed and patched several open vulnerabilities, some of which had already been fixed in … Read more Published Date: Mar 05, 2025 (4 hours, 10 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-53025 CVE-2024-53011 CVE-2024-43051 […]

CVE-2025-2003 – Devolutions Server PAM Vault Authorization Bypass

The following table lists the changes that have been made to the CVE-2025-2003 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Mar. 05, 2025 Action Type […]

CVE-2025-27515 – Laravel Wildcard Validation Bypass

The following table lists the changes that have been made to the CVE-2025-27515 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]

CVE-2025-27513 – OpenTelemetry DoS Header Processing

The following table lists the changes that have been made to the CVE-2025-27513 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]

CVE-2024-48246 – Volkswagen Vehicle Management System Stored XSS

The following table lists the changes that have been made to the CVE-2024-48246 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]

CVE-2024-31525 – Peppermint Ticket Management Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2024-31525 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]

Silk Typhoon hackers now target IT supply chains to breach networks

Silk Typhoon hackers now target IT supply chains to breach networks Microsoft warns that Chinese cyber-espionage threat group ‘Silk Typhoon’ has shifted its tactics, now targeting remote management tools and cloud services in supply chain attacks that give them access … Read more Published Date: Mar 05, 2025 (4 hours, 4 minutes ago) Vulnerabilities has been mentioned […]