CVE-2024-11679 – IBM System x Server Memory Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2024-11679 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 11, 2025 Action […]

CVE-2025-0119 – Palo Alto Networks Cortex XDR Broker VM Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-0119 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 11, 2025 Action […]

CVE-2025-0123 – Palo Alto Networks PAN-OS Unauthorized Access to Decrypted Packet Captures

A vulnerability in the Palo Alto Networks PAN-OS® software enables unlicensed administrators to view clear-text data captured using the packet capture feature https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/monitoring/take-packet-captures/take-a-custom-packet-capture in decrypted HTTP/2 data streams traversing network interfaces on the firewall. HTTP/1.1 data streams are not impacted. In normal conditions, decrypted packet captures are available to firewall administrators after they obtain and […]

Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit Network Security / Vulnerability Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after the initial access vector used to bre … Read more Published Date: Apr 11, 2025 (2 hours, 17 minutes ago) Vulnerabilities has […]

CVE-2025-32367 – Oz Forensics Face Recognition IDOR

The following table lists the changes that have been made to the CVE-2025-32367 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Apr. 11, 2025 Action Type […]

CVE-2025-32079 – Wikimedia Mediawiki GrowthExperiments HTTP Denial of Service (DoS)

The following table lists the changes that have been made to the CVE-2025-32079 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by c4f26cc8-17ff-4c99-b5e2-38fc1793eacc Apr. 11, 2025 Action […]

CVE-2025-32078 – Wikimedia Mediawiki Version Compare Extension XSS

The following table lists the changes that have been made to the CVE-2025-32078 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by c4f26cc8-17ff-4c99-b5e2-38fc1793eacc Apr. 11, 2025 Action […]

CVE-2025-32077 – WikiMedia SimpleCalendar XSS

The following table lists the changes that have been made to the CVE-2025-32077 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by c4f26cc8-17ff-4c99-b5e2-38fc1793eacc Apr. 11, 2025 Action […]

CVE-2025-32076 – Wikimedia Mediawiki Visual Data Extension HTTP DoS Vulnerability

The following table lists the changes that have been made to the CVE-2025-32076 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by c4f26cc8-17ff-4c99-b5e2-38fc1793eacc Apr. 11, 2025 Action […]