Samsung MagicINFO 9 Server Vulnerability Exploited in the Wild
Samsung MagicINFO 9 Server Vulnerability Exploited in the Wild A critical security vulnerability in Samsung’s digital signage management platform has moved from theoretical risk to active threat as attackers begin exploiting it in real-world attacks. CVE-2024-739 … Read more Published Date: May 06, 2025 (1 hour, 16 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-7399
CVE-2025-4353 – Golden Link Secondary System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-4353 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]
CVE-2025-4352 – Golden Link Secondary System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-4352 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]
CVE-2025-4350 – D-Link DIR-600L Wake-on-LAN Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-4350 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]
CVE-2025-4349 – “Critical Command Injection in D-Link DIR-600L”
The following table lists the changes that have been made to the CVE-2025-4349 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]
CVE-2025-0984 – Netoloji Software E-Flow Cross-site Scripting (XSS) and File Content Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-0984 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]
CVE-2025-4348 – D-Link DIR-600L L2TP Buffer Overflow
The following table lists the changes that have been made to the CVE-2025-4348 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]
CVE-2025-40625 – TCMAN GIM Unauthenticated File Upload RCE
The following table lists the changes that have been made to the CVE-2025-40625 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]
CVE-2025-40624 – TCMAN’s GIM SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-40624 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]
CVE-2025-40623 – TCMAN GIM SQL Injection
The following table lists the changes that have been made to the CVE-2025-40623 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]