CVE-2025-46102 – Beakon Learning Management System SCORM Cross Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-46102 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2024-13972 – Intercept X for Windows Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2024-13972 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-7749 – Code-projects Online Appointment Booking System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-7749 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-7748 – ZCMS Cross Site Scripting (XSS) Vulnerability in Create Article Page
The following table lists the changes that have been made to the CVE-2025-7748 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-7747 – Tenda POST Request Handler Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-7747 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-53644 – OpenCV Heap Buffer Write Vulnerability
The following table lists the changes that have been made to the CVE-2025-53644 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-51497 – AdGuard Safari MacOS Information Disclosure
The following table lists the changes that have been made to the CVE-2025-51497 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-53638 – Solady Silent Failure in Proxy Initialization Vulnerability
The following table lists the changes that have been made to the CVE-2025-53638 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-23263 – NVIDIA DOCA-Host and Mellanox OFED VGT+ Privilege Escalation and Denial of Service Vulnerability
The following table lists the changes that have been made to the CVE-2025-23263 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
H2Miner Attacking Linux, Windows, and Containers to Mine Monero
H2Miner Attacking Linux, Windows, and Containers to Mine Monero The H2Miner botnet, first observed in late 2019, has resurfaced with an expanded arsenal that blurs the line between cryptojacking and ransomware. The latest campaign leverages inexpensive virtual pri … Read more Published Date: Jul 17, 2025 (3 hours, 15 minutes ago) Vulnerabilities has been mentioned in this […]