CVE-2025-20141 – Cisco IOS XR Route Processor Linux Stack Denial of Service Vulnerability
The following table lists the changes that have been made to the CVE-2025-20141 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-20138 – “Cisco IOS XR CLI Command Injection Vulnerability”
The following table lists the changes that have been made to the CVE-2025-20138 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-20115 – Cisco IOS XR BGP Confederation Denial of Service Vulnerability
A vulnerability in confederation implementation for the Border Gateway Protocol (BGP) in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to a memory corruption that occurs when a BGP update is created with an AS_CONFED_SEQUENCE attribute that has 255 autonomous system numbers […]
CVE-2025-1960 – WebHMI Default Credential Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-1960 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1984 – Xerox Desktop Print Experience Local Privilege Escalation
The following table lists the changes that have been made to the CVE-2025-1984 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1683 – 1E Client Symbolic Link Deletion Vulnerability
The following table lists the changes that have been made to the CVE-2025-1683 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-22954 – “Koha SQL Injection Vulnerability”
The following table lists the changes that have been made to the CVE-2025-22954 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-13446 – Workreap WordPress Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2024-13446 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-58087 – “Linux Kernel ksmbd Racy Session Reference Count Vulnerability”
The following table lists the changes that have been made to the CVE-2024-58087 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.