CVE-2025-20332 – Cisco ISE HTTP Request Forgery (Remote Code Execution)

The following table lists the changes that have been made to the CVE-2025-20332 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]

CVE-2025-20331 – Cisco ISE/Cisco ISE-PIC Stored XSS Vulnerability

The following table lists the changes that have been made to the CVE-2025-20331 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]

CVE-2025-20215 – Cisco Webex Meetings Unauthenticated Meeting-Join Vulnerability

A vulnerability in the meeting-join functionality of Cisco Webex Meetings could have allowed an unauthenticated, network-proximate attacker to complete a meeting-join process in place of an intended targeted user, provided the requisite conditions were satisfied. Cisco has addressed this vulnerability in the Cisco Webex Meetings service, and no customer action is needed. This vulnerability existed […]

CVE-2025-53786 – Microsoft Exchange Server Hybrid Deployment Authentication Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-53786 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]

CVE-2025-51532 – Sage DPW Unauthenticated Access Control Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-51532 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]

CVE-2025-51531 – Sage DPW Reflected Cross-Site Scripting (XSS)

The following table lists the changes that have been made to the CVE-2025-51531 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]

CVE-2025-48394 – Eaton File Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2025-48394 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]

CVE-2025-48393 – Eaton Firmware Man-in-the-Middle Attack Vulnerability

The following table lists the changes that have been made to the CVE-2025-48393 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]

CVE-2024-8244 – Go filepath Symbolic Link TOCTOU

The following table lists the changes that have been made to the CVE-2024-8244 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]