CVE-2025-39413 – David Gwyer Simple Sitemap Missing Authorization Vulnerability
The following table lists the changes that have been made to the CVE-2025-39413 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]
CVE-2025-33074 – Microsoft Azure Functions Cryptographic Signature Verification Bypass
The following table lists the changes that have been made to the CVE-2025-33074 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]
CVE-2025-30392 – Azure Bot Framework SDK Privilege Escalation Unauthorized Access
The following table lists the changes that have been made to the CVE-2025-30392 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]
CVE-2025-30391 – Microsoft Dynamics Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2025-30391 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]
CVE-2025-2156 – Red Hat Linux Kernel Uninitialized Memory Access
The following table lists the changes that have been made to the CVE-2025-2156 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Apr. 30, 2025 Action Type […]
CVE-2025-30390 – Azure AzureAD Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-30390 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]
CVE-2025-30389 – Azure Bot Framework SDK Authorization Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-30389 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]
CVE-2025-24091 – Apple Notification Service Impersonation and Denial-of-Service Vulnerability
The following table lists the changes that have been made to the CVE-2025-24091 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]
CVE-2025-21416 – Azure Virtual Desktop Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-21416 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]
SonicWall: SMA100 VPN vulnerabilities now exploited in attacks
SonicWall: SMA100 VPN vulnerabilities now exploited in attacks Cybersecurity company SonicWall has warned customers that several vulnerabilities impacting its Secure Mobile Access (SMA) appliances are now being actively exploited in attacks. On Tuesday, SonicWal … Read more Published Date: Apr 30, 2025 (1 hour, 16 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-38475 CVE-2023-44221 CVE-2021-20035