CVE-2024-53458 – Sysax Multi Server SSH Denial of Service

The following table lists the changes that have been made to the CVE-2024-53458 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]

Chinese Silk Typhoon Group Targets IT Tools for Network Breaches

Chinese Silk Typhoon Group Targets IT Tools for Network Breaches Cybersecurity researchers at Microsoft Threat Intelligence have observed that Silk Typhoon aka HAFNIUM, a Chinese espionage group known for its technical skill, is now using common IT solutions as a g … Read more Published Date: Mar 05, 2025 (2 hours, 57 minutes ago) Vulnerabilities has been […]

CVE-2025-20208 – “Cisco TelePresence Management Suite XSS Vulnerability”

The following table lists the changes that have been made to the CVE-2025-20208 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]

CVE-2025-20206 – Cisco Secure Client DLL Hijacking Vulnerability

The following table lists the changes that have been made to the CVE-2025-20206 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]

CVE-2024-11035 – Carbon Black Cloud Windows Sensor Information Leak Vulnerability

The following table lists the changes that have been made to the CVE-2024-11035 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Mar. 05, 2025 Action Type […]

CVE-2025-27497 – OpenDJ LDAP Denial-of-Service Vulnerability

The following table lists the changes that have been made to the CVE-2025-27497 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-27411 – REDAXO File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2025-27411 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-24494 – Android Device Admin Path Traversal Remote Code Execution

The following table lists the changes that have been made to the CVE-2025-24494 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.