CVE-2025-28236 – Nautel VX Series Transmitters Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-28236 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 18, 2025 Action […]

CVE-2025-28235 – Soundcraft Ui Series Information Disclosure

The following table lists the changes that have been made to the CVE-2025-28235 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 18, 2025 Action […]

CVE-2025-28231 – Itel Electronics IP Stream Remote Command Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-28231 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 18, 2025 Action […]

CVE-2025-1697 – HP Touchpoint Analytics Service Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-1697 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 18, 2025 Action […]

CVE-2025-28059 – Nagios Network Analyzer Session Hijacking Vulnerability

The following table lists the changes that have been made to the CVE-2025-28059 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 18, 2025 Action […]

CVE-2024-41447 – Alkacon OpenCMS Stored Cross-Site Scripting (XSS) Vulnerability

The following table lists the changes that have been made to the CVE-2024-41447 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 18, 2025 Action […]

Leaked KeyPlug Malware Infrastructure Contains Exploit Scripts to Hack Fortinet Firewall and VPN

Leaked KeyPlug Malware Infrastructure Contains Exploit Scripts to Hack Fortinet Firewall and VPN A server briefly linked to the notorious KeyPlug malware has inadvertently exposed a comprehensive arsenal of exploitation tools specifically designed to target Fortinet firewall and VPN appliances. T … Read more Published Date: Apr 18, 2025 (2 hours, 40 minutes ago) Vulnerabilities has been […]

CVE-2025-32796 – Dify App Management Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-32796 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Apr. 18, 2025 Action Type […]

CVE-2025-32795 – Dify App Name, Description and Icon Permission Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-32795 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Apr. 18, 2025 Action Type […]