CVE-2025-4139 – Netgear EX6120 Remote Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-4139 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]
CVE-2025-24132 – Apple AirPlay Local Network Denial of Service
The following table lists the changes that have been made to the CVE-2025-24132 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]
CVE-2025-30422 – AirPlay Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-30422 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]
CVE-2022-42449 – HCL Domino Volt HTML Injection Vulnerability
The following table lists the changes that have been made to the CVE-2022-42449 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]
CVE-2022-27562 – HCL Domino Volt HTML Injection Vulnerability
The following table lists the changes that have been made to the CVE-2022-27562 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]
Critical vulnerability in SAP NetWeaver enables malicious file uploads
Critical vulnerability in SAP NetWeaver enables malicious file uploads Adversaries can exploit CVE-2025-31324 to upload web shells and other unauthorized files to execute on the SAP NetWeaver server April 30, 2025Red Canary has observed activity exploiting a newly-docume … Read more Published Date: Apr 30, 2025 (2 hours, 7 minutes ago) Vulnerabilities has been mentioned in this […]
CVE-2025-4136 – Weitong Mall Remote Unauthorized Access Vulnerability
The following table lists the changes that have been made to the CVE-2025-4136 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]
CVE-2025-27611 – Base-x Unvalidated User Input Address Manipulation Vulnerability
base-x is a base encoder and decoder of any given alphabet using bitcoin style leading zero compression. Versions 4.0.0, 5.0.0, and all prior to 3.0.11, are vulnerable to attackers potentially deceiving users into sending funds to an unintended address. This issue has been patched in versions 3.0.11, 4.0.1, and 5.0.1.
CVE-2024-6032 – Tesla Model S Iris Modem Command Injection Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2024-6032 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]
CVE-2024-6031 – Tesla Model S oFono AT Command Heap Buffer Overflow Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2024-6031 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]