CVE-2025-9482 – “Linksys Wireless Router Stack-Based Buffer Overflow Vulnerability”
The following table lists the changes that have been made to the CVE-2025-9482 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]
CVE-2025-9481 – Linksys Router Stack-Based Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-9481 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]
CVE-2025-8424 – Citrix NetScaler ADC and Gateway Unauthenticated Remote Command Injection
The following table lists the changes that have been made to the CVE-2025-8424 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]
CVE-2025-55526 – n8n-workflows Directory Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-55526 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]
CVE-2025-50753 – Mitrastar GPT-2741GNAC-N2 SSH Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-50753 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]
CVE-2025-29992 – Mahara Database Connection Information Disclosure
The following table lists the changes that have been made to the CVE-2025-29992 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]
CVE-2024-47853 – Mahara LTI Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2024-47853 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]
CVE-2024-45753 – Mahara External RSS Feed Block Cross-Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2024-45753 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]
Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It
Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It Online PDF editors have become common tools for quick document manipulation, providing convenient alternatives to desktop software. However, their cloud-based nature brings significant security vulner … Read more Published Date: Aug 26, 2025 (1 hour, 32 minutes ago) Vulnerabilities has been mentioned in […]
Citrix-systemen aangevallen via nieuwe kritieke RCE-kwetsbaarheid
Citrix-systemen aangevallen via nieuwe kritieke RCE-kwetsbaarheid dinsdag 26 augustus 2025, 16:06 door Redactie, 2 reactiesLaatst bijgewerkt: Vandaag, 16:44 Citrix-systemen zijn aangevallen via een nieuwe kritieke kwetsbaarheid die tot remote code execution leidt, w … Read more Published Date: Aug 26, 2025 (3 hours, 47 minutes ago) Vulnerabilities has been mentioned in this article.