CVE-2025-47884 – Jenkins OpenID Connect Provider Plugin Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-47884 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2025-47888 – Jenkins DingTalk Plugin SSL/TLS Certificate Validation Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-47888 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2025-44024 – Pichome XSS
The following table lists the changes that have been made to the CVE-2025-44024 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2025-27891 – Samsung Exynos Modem NAS Packet Length Check Vulnerability
An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. The lack of a length check leads to out-of-bounds reads via malformed NAS packets.
CVE-2024-56427 – Samsung Exynos Modem RRC Packet Out-of-Bounds Access Vulnerability
An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. The lack of a length check leads to out-of-bounds access via malformed RRC packets to the target.
CVE-2024-55569 – Samsung Exynos Out-of-Bounds Write Vulnerability
An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. The lack of a length check leads to out-of-bounds writes.
CVE-2025-32363 – mediDOK Deserialization Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-32363 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2025-25370 – Realme GT 2 Information Disclosure
The following table lists the changes that have been made to the CVE-2025-25370 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2024-57096 – WPS Office Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2024-57096 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2024-58101 – Samsung Galaxy Buds Audio Devices Bluetooth Pairing Remote Takeover Vulnerability
The following table lists the changes that have been made to the CVE-2024-58101 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]