CVE-2025-4139 – Netgear EX6120 Remote Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-4139 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]

CVE-2025-24132 – Apple AirPlay Local Network Denial of Service

The following table lists the changes that have been made to the CVE-2025-24132 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]

CVE-2025-30422 – AirPlay Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-30422 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]

CVE-2022-42449 – HCL Domino Volt HTML Injection Vulnerability

The following table lists the changes that have been made to the CVE-2022-42449 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]

CVE-2022-27562 – HCL Domino Volt HTML Injection Vulnerability

The following table lists the changes that have been made to the CVE-2022-27562 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]

Critical vulnerability in SAP NetWeaver enables malicious file uploads

Critical vulnerability in SAP NetWeaver enables malicious file uploads Adversaries can exploit CVE-2025-31324 to upload web shells and other unauthorized files to execute on the SAP NetWeaver server April 30, 2025Red Canary has observed activity exploiting a newly-docume … Read more Published Date: Apr 30, 2025 (2 hours, 7 minutes ago) Vulnerabilities has been mentioned in this […]

CVE-2025-4136 – Weitong Mall Remote Unauthorized Access Vulnerability

The following table lists the changes that have been made to the CVE-2025-4136 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]

CVE-2024-6032 – Tesla Model S Iris Modem Command Injection Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2024-6032 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]

CVE-2024-6031 – Tesla Model S oFono AT Command Heap Buffer Overflow Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2024-6031 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]