CVE-2025-28236 – Nautel VX Series Transmitters Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-28236 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 18, 2025 Action […]
CVE-2025-28235 – Soundcraft Ui Series Information Disclosure
The following table lists the changes that have been made to the CVE-2025-28235 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 18, 2025 Action […]
CVE-2025-28233 – BW Broadcast TX600/150/1000/30/50 Authentication Bypass Vulnerability
Incorrect access control in BW Broadcast TX600 (14980), TX300 (32990) (31448), TX150, TX1000, TX30, and TX50 Hardware Version: 2, Software Version: 1.6.0, Control Version: 1.0, AIO Firmware Version: 1.7 allows attackers to access log files and extract session identifiers to execute a session hijacking attack.
CVE-2025-28231 – Itel Electronics IP Stream Remote Command Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-28231 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 18, 2025 Action […]
CVE-2025-1697 – HP Touchpoint Analytics Service Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-1697 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 18, 2025 Action […]
CVE-2025-28059 – Nagios Network Analyzer Session Hijacking Vulnerability
The following table lists the changes that have been made to the CVE-2025-28059 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 18, 2025 Action […]
CVE-2024-41447 – Alkacon OpenCMS Stored Cross-Site Scripting (XSS) Vulnerability
The following table lists the changes that have been made to the CVE-2024-41447 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 18, 2025 Action […]
Leaked KeyPlug Malware Infrastructure Contains Exploit Scripts to Hack Fortinet Firewall and VPN
Leaked KeyPlug Malware Infrastructure Contains Exploit Scripts to Hack Fortinet Firewall and VPN A server briefly linked to the notorious KeyPlug malware has inadvertently exposed a comprehensive arsenal of exploitation tools specifically designed to target Fortinet firewall and VPN appliances. T … Read more Published Date: Apr 18, 2025 (2 hours, 40 minutes ago) Vulnerabilities has been […]
CVE-2025-32796 – Dify App Management Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-32796 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Apr. 18, 2025 Action Type […]
CVE-2025-32795 – Dify App Name, Description and Icon Permission Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-32795 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Apr. 18, 2025 Action Type […]