CVE-2025-23416 – Apache Device Path Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-23416 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-22212 – Joomla ConvertForms SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-22212 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-21095 – Apache HTTP Server Path Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-21095 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2023-38693 – Lucee Server XXE Remote Code Execution Vulnerability
Lucee Server (or simply Lucee) is a dynamic, Java based, tag and scripting language used for rapid web application development. The Lucee REST endpoint is vulnerable to RCE via an XML XXE attack. This vulnerability is fixed in Lucee 5.4.3.2, 5.3.12.1, 5.3.7.59, 5.3.8.236, and 5.3.9.173.
Microsoft Warns of Silk Typhoon Hackers Attacking IT Supply Chain
Microsoft Warns of Silk Typhoon Hackers Attacking IT Supply Chain Microsoft Threat Intelligence has identified a significant shift in tactics by Silk Typhoon, a Chinese state-sponsored espionage group that has begun targeting common IT solutions including remote man … Read more Published Date: Mar 05, 2025 (2 hours, 9 minutes ago) Vulnerabilities has been mentioned in this […]
China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access
China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access Network Security / Data Breach The China-lined threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the infor … Read more Published Date: Mar 05, 2025 (2 hours, 38 minutes ago) […]
CVE-2025-1714 – Perforce Gliffy Sign-up Workflow Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-1714 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]
CVE-2024-12799 – OpenText Identity Manager Advanced Edition: Credential Exposure Vulnerability
The following table lists the changes that have been made to the CVE-2024-12799 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]
CVE-2024-12097 – Boceksoft Informatics E-Travel SQL Injection
The following table lists the changes that have been made to the CVE-2024-12097 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]
CVE-2024-13147 – Merkur Software B2B Login Panel SQL Injection
The following table lists the changes that have been made to the CVE-2024-13147 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]