CVE-2025-21463 – Cisco Wireless EHT IE Beacon Frame Processing Denial of Service
The following table lists the changes that have been made to the CVE-2025-21463 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]
CVE-2024-53020 – Apache Tomcat RTP Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2024-53020 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]
CVE-2024-53019 – Cisco RTP Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2024-53019 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]
CVE-2024-53018 – Cisco IOS Memory Corruption Vulnerability
The following table lists the changes that have been made to the CVE-2024-53018 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]
CVE-2024-53017 – Citrix ADC Integer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2024-53017 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]
CVE-2024-53016 – Canon Camera Off-Path Memory Corruption Vulnerability
The following table lists the changes that have been made to the CVE-2024-53016 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]
CVE-2024-53015 – Apache VFS Filesystem Buffer Overflow
The following table lists the changes that have been made to the CVE-2024-53015 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]
CVE-2024-53013 – Google Android Audio Call Registration Buffer Overflow
The following table lists the changes that have been made to the CVE-2024-53013 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]
CVE-2024-53010 – VMware ESXi Memory Corruption Vulnerability
CVE ID : CVE-2024-53010 Published : June 3, 2025, 6:15 a.m. | 1 hour, 56 minutes ago Description : Memory corruption may occur while attaching VM when the HLOS retains access to VM. Severity: 7.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…
Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code
Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code A significant security vulnerability in the Splunk Enterprise platform could allow low-privileged attackers to execute unauthorized JavaScript code through a reflected Cross-Site Scripting (XSS) flaw. … Read more Published Date: Jun 03, 2025 (1 hour, 52 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-20297