CVE-2025-20227 – Splunk Enterprise/Cloud Platform External Content Warning Bypass

In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.107, 9.2.2406.112, 9.2.2403.115, 9.1.2312.208 and 9.1.2308.214, a low-privileged user that does not hold the “admin” or “power” Splunk roles could bypass the external content warning modal dialog box in Dashboard Studio dashboards which could lead to an information disclosure.

CVE-2025-20226 – Splunk Enterprise/Bypass of SPL Safeguards for Risky Commands

In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.3.2408.107, 9.2.2406.111, and 9.1.2308.214, a low-privileged user that does not hold the “admin” or “power” Splunk roles could run a saved search with a risky command using the permissions of a higher-privileged user to bypass the SPL safeguards for […]

CVE-2024-55965 – Appsmith Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2024-55965 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]

CVE-2025-31160 – Atop Denial of Service Vulnerability

The following table lists the changes that have been made to the CVE-2025-31160 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]

CVE-2025-2787 – KNIME Business Hub Ingress-nginx Cluster Takeover Vulnerability

The following table lists the changes that have been made to the CVE-2025-2787 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by [email protected] Mar. 26, 2025 Action Type […]

Oracle customers confirm data stolen in alleged cloud breach is valid

Oracle customers confirm data stolen in alleged cloud breach is valid Despite Oracle denying a breach of its Oracle Cloud federated SSO login servers and the theft of account data for 6 million people, BleepingComputer has confirmed with multiple companies that associat … Read more Published Date: Mar 26, 2025 (3 hours, 25 minutes ago) Vulnerabilities has been […]

CVE-2025-30073 – OPC cardsystems Webapp Aufwertung Referential Reuse Vulnerability

The following table lists the changes that have been made to the CVE-2025-30073 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]

CVE-2025-26011 – Telesquare TLR-2005KSH Stack Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-26011 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]

CVE-2025-28361 – Telesquare TLR-2005KSH Stack Overflow Information Disclosure

The following table lists the changes that have been made to the CVE-2025-28361 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]

CVE-2025-26010 – Telesquare TLR-2005KSH Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-26010 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 26, 2025 Action […]