CVE-2025-31681 – Drupal Authenticator Forceful Browsing Authorization Bypass
The following table lists the changes that have been made to the CVE-2025-31681 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 31, 2025 Action […]
CVE-2025-31680 – Drupal Matomo Analytics CSRF Vulnerability
The following table lists the changes that have been made to the CVE-2025-31680 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 31, 2025 Action […]
CVE-2025-31678 – Drupal AI Missing Authorization Vulnerability
The following table lists the changes that have been made to the CVE-2025-31678 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 31, 2025 Action […]
CVE-2025-31679 – Drupal Ignition Error Pages Cross-site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2025-31679 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 31, 2025 Action […]
CVE-2025-31677 – Drupal AI CSRF
The following table lists the changes that have been made to the CVE-2025-31677 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 31, 2025 Action […]
CVE-2025-26683 – Azure Playwright Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-26683 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 31, 2025 Action […]
Oracle Cloud Users Urged to Take Action
Oracle Cloud Users Urged to Take Action Source: sdx15 via ShutterstockWith Oracle not budging from its denial of a breach that a growing number of security experts believe occurred, some are urging the company’s cloud customers to take imme … Read more Published Date: Mar 31, 2025 (3 hours, 19 minutes ago) Vulnerabilities has been mentioned in […]
CVE-2025-3010 – Khronos Group glslang Null Pointer Dereference Vulnerability
The following table lists the changes that have been made to the CVE-2025-3010 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 31, 2025 Action […]
CVE-2025-31124 – Zitadel Username Existence Disclosure
Zitadel is open-source identity infrastructure software. ZITADEL administrators can enable a setting called “Ignoring unknown usernames” which helps mitigate attacks that try to guess/enumerate usernames. If enabled, ZITADEL will show the password prompt even if the user doesn’t exist and report “Username or Password invalid”. While the setting was correctly respected during the login flow, […]
CVE-2025-31123 – Zitadel JWT Key Expiration Bypass
Zitadel is open-source identity infrastructure software. A vulnerability existed where expired keys can be used to retrieve tokens. Specifically, ZITADEL fails to properly check the expiration date of the JWT key when used for Authorization Grants. This allows an attacker with an expired key to obtain valid access tokens. This vulnerability does not affect the […]