CVE-2025-20332 – Cisco ISE HTTP Request Forgery (Remote Code Execution)
The following table lists the changes that have been made to the CVE-2025-20332 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-30127 – Marbella KR8s Dashcam FF Information Disclosure and File Access Vulnerability
An issue was discovered on Marbella KR8s Dashcam FF 2.0.8 devices. Once access is gained either by default, common, or cracked passwords, the video recordings (containing sensitive routes, conversations, and footage) are open for downloading by creating a socket to command port 7777, and then downloading video via port 7778 and audio via port 7779.
CVE-2025-20331 – Cisco ISE/Cisco ISE-PIC Stored XSS Vulnerability
The following table lists the changes that have been made to the CVE-2025-20331 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-20215 – Cisco Webex Meetings Unauthenticated Meeting-Join Vulnerability
A vulnerability in the meeting-join functionality of Cisco Webex Meetings could have allowed an unauthenticated, network-proximate attacker to complete a meeting-join process in place of an intended targeted user, provided the requisite conditions were satisfied. Cisco has addressed this vulnerability in the Cisco Webex Meetings service, and no customer action is needed. This vulnerability existed […]
CVE-2025-53786 – Microsoft Exchange Server Hybrid Deployment Authentication Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-53786 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-51532 – Sage DPW Unauthenticated Access Control Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-51532 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-51531 – Sage DPW Reflected Cross-Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2025-51531 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-48394 – Eaton File Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-48394 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-48393 – Eaton Firmware Man-in-the-Middle Attack Vulnerability
The following table lists the changes that have been made to the CVE-2025-48393 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2024-8244 – Go filepath Symbolic Link TOCTOU
The following table lists the changes that have been made to the CVE-2024-8244 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]