CVE-2025-30373 – Graylog HTTP Input Authentication Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-30373 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]

CVE-2025-3370 – PHPGurukul Men Salon Management System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-3370 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]

CVE-2025-3369 – Novel-Plus SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-3369 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]

CVE-2025-30195 – PowerDNS Recursor DNS Cache Poisoning Denial of Service

The following table lists the changes that have been made to the CVE-2025-30195 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]

CVE-2025-2251 – WildFly/JBoss EAP EJB Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-2251 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]

CVE-2025-27686 – Dell Unisphere for PowerMax LDAP Injection

The following table lists the changes that have been made to the CVE-2025-27686 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]

20-Year-Old Scattered Spider Hacker Pleads Guilty Of Sophisticated Ransomware Attacks

20-Year-Old Scattered Spider Hacker Pleads Guilty Of Sophisticated Ransomware Attacks A 20-year-old Florida man identified as a key member of the notorious “Scattered Spider” cybercriminal collective has pleaded guilty to orchestrating sophisticated ransomware attacks and cryptocurrenc … Read more Published Date: Apr 07, 2025 (2 hours, 23 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2023-45133

ToddyCat Hackers Exploit ESET’s Command Line Scanner Vulnerability to Evade Detection

ToddyCat Hackers Exploit ESET’s Command Line Scanner Vulnerability to Evade Detection ToddyCat, the notorious APT group, used a sophisticated attack strategy to stealthily deploy malicious code in targeted systems by exploiting a weakness in ESET’s command line scanner. The vulnerabili … Read more Published Date: Apr 07, 2025 (2 hours, 55 minutes ago) Vulnerabilities has been mentioned […]

CVE-2025-3360 – GLib ISO 8601 Timestamp Parsing Integer Overflow/Buffer Under-read Vulnerability

The following table lists the changes that have been made to the CVE-2025-3360 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]

CVE-2025-3359 – GNUPlot Segmentation Fault Vulnerability

The following table lists the changes that have been made to the CVE-2025-3359 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 07, 2025 Action […]