CVE-2025-39413 – David Gwyer Simple Sitemap Missing Authorization Vulnerability

The following table lists the changes that have been made to the CVE-2025-39413 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]

CVE-2025-33074 – Microsoft Azure Functions Cryptographic Signature Verification Bypass

The following table lists the changes that have been made to the CVE-2025-33074 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]

CVE-2025-30392 – Azure Bot Framework SDK Privilege Escalation Unauthorized Access

The following table lists the changes that have been made to the CVE-2025-30392 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]

CVE-2025-30391 – Microsoft Dynamics Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2025-30391 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]

CVE-2025-2156 – Red Hat Linux Kernel Uninitialized Memory Access

The following table lists the changes that have been made to the CVE-2025-2156 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Apr. 30, 2025 Action Type […]

CVE-2025-30390 – Azure AzureAD Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-30390 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]

CVE-2025-30389 – Azure Bot Framework SDK Authorization Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-30389 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]

CVE-2025-24091 – Apple Notification Service Impersonation and Denial-of-Service Vulnerability

The following table lists the changes that have been made to the CVE-2025-24091 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]

CVE-2025-21416 – Azure Virtual Desktop Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-21416 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 30, 2025 Action […]

SonicWall: SMA100 VPN vulnerabilities now exploited in attacks

SonicWall: SMA100 VPN vulnerabilities now exploited in attacks ​Cybersecurity company SonicWall has warned customers that several vulnerabilities impacting its Secure Mobile Access (SMA) appliances are now being actively exploited in attacks. On Tuesday, SonicWal … Read more Published Date: Apr 30, 2025 (1 hour, 16 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-38475 CVE-2023-44221 CVE-2021-20035