Samsung MagicINFO 9 Server Vulnerability Exploited in the Wild

Samsung MagicINFO 9 Server Vulnerability Exploited in the Wild A critical security vulnerability in Samsung’s digital signage management platform has moved from theoretical risk to active threat as attackers begin exploiting it in real-world attacks. CVE-2024-739 … Read more Published Date: May 06, 2025 (1 hour, 16 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-7399

CVE-2025-4353 – Golden Link Secondary System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-4353 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-4352 – Golden Link Secondary System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-4352 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-4350 – D-Link DIR-600L Wake-on-LAN Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-4350 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-4349 – “Critical Command Injection in D-Link DIR-600L”

The following table lists the changes that have been made to the CVE-2025-4349 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-0984 – Netoloji Software E-Flow Cross-site Scripting (XSS) and File Content Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-0984 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-4348 – D-Link DIR-600L L2TP Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-4348 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-40625 – TCMAN GIM Unauthenticated File Upload RCE

The following table lists the changes that have been made to the CVE-2025-40625 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-40624 – TCMAN’s GIM SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-40624 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]

CVE-2025-40623 – TCMAN GIM SQL Injection

The following table lists the changes that have been made to the CVE-2025-40623 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 06, 2025 Action […]