CVE-2025-21463 – Cisco Wireless EHT IE Beacon Frame Processing Denial of Service

The following table lists the changes that have been made to the CVE-2025-21463 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2024-53020 – Apache Tomcat RTP Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2024-53020 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2024-53019 – Cisco RTP Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2024-53019 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2024-53018 – Cisco IOS Memory Corruption Vulnerability

The following table lists the changes that have been made to the CVE-2024-53018 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2024-53017 – Citrix ADC Integer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2024-53017 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2024-53016 – Canon Camera Off-Path Memory Corruption Vulnerability

The following table lists the changes that have been made to the CVE-2024-53016 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2024-53015 – Apache VFS Filesystem Buffer Overflow

The following table lists the changes that have been made to the CVE-2024-53015 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2024-53013 – Google Android Audio Call Registration Buffer Overflow

The following table lists the changes that have been made to the CVE-2024-53013 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2024-53010 – VMware ESXi Memory Corruption Vulnerability

CVE ID : CVE-2024-53010 Published : June 3, 2025, 6:15 a.m. | 1 hour, 56 minutes ago Description : Memory corruption may occur while attaching VM when the HLOS retains access to VM. Severity: 7.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…

Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code

Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code A significant security vulnerability in the Splunk Enterprise platform could allow low-privileged attackers to execute unauthorized JavaScript code through a reflected Cross-Site Scripting (XSS) flaw. … Read more Published Date: Jun 03, 2025 (1 hour, 52 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-20297