CVE-2025-26262 – R-fx Networks Linux Malware Detect Arbitrary Code Execution and Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-26262 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-22476 – Dell Storage Center Dell Storage Manager Command Injection

The following table lists the changes that have been made to the CVE-2025-22476 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2023-33770 – “RealtyX SQL Injection”

The following table lists the changes that have been made to the CVE-2023-33770 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

Samsung MagicINFO 9 Server RCE flaw now exploited in attacks

Samsung MagicINFO 9 Server RCE flaw now exploited in attacks Hackers are exploiting an unauthenticated remote code execution (RCE) vulnerability in the Samsung MagicINFO 9 Server to hijack devices and deploy malware. Samsung MagicINFO Server is a centralized co … Read more Published Date: May 06, 2025 (3 hours, 30 minutes ago) Vulnerabilities has been mentioned in […]

CVE-2025-4384 – PcVue MQTT Certificate Validation Bypass

The following table lists the changes that have been made to the CVE-2025-4384 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 87c8e6ad-f0f5-4ca8-89e2-89f26d6ed932 May. 06, 2025 Action […]

CVE-2025-4368 – Tenda AC8 Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-4368 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-4363 – iSourcecode Gym Management System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-4363 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 May. 06, 2025 Action Type […]

CVE-2025-45492 – Netgear EX8000 Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-45492 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-45491 – Linksys E5600 Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-45491 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-45490 – Linksys E5600 Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-45490 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]