CVE-2025-57767 – Asterisk SIP Authorization Header Null Pointer Dereference Vulnerability
Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.15.2, 21.10.2, and 22.5.2, if a SIP request is received with an Authorization header that contains a realm that wasn’t in a previous 401 response’s WWW-Authenticate header, or an Authorization header with an incorrect realm was received without a previous 401 […]
CVE-2025-51643 – Meitrack T366G-L GPS Tracker Unauthenticated SPI Flash Chip Extraction
The following table lists the changes that have been made to the CVE-2025-51643 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 28, 2025 Action […]
CVE-2025-29364 – Spim Simulator Spim Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-29364 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 28, 2025 Action […]
CVE-2025-25010 – Kibana Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-25010 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 28, 2025 Action […]
CVE-2024-13986 – Nagios XI Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2024-13986 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 28, 2025 Action […]
Urgent CISA Alert on Citrix NetScaler
Urgent CISA Alert on Citrix NetScaler August 28, 2025In August 2025, the Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert regarding multiple critical security vulnerabilities actively exploited in Citrix NetS … Read more Published Date: Aug 28, 2025 (2 hours, 32 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-7775
CVE-2025-8067 – Udisks D-BUS Loop Device Handler Index Validation Bypass
A flaw was found in the Udisks daemon, where it allows unprivileged users to create loop devices using the D-BUS system. This is achieved via the loop device handler, which handles requests sent through the D-BUS interface. As two of the parameters of this handle, it receives the file descriptor list and index specifying the […]
CVE-2025-55583 – D-Link DIR-868L Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-55583 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 28, 2025 Action […]
CVE-2025-56236 – FormCms Stored XSS Vulnerability
The following table lists the changes that have been made to the CVE-2025-56236 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 28, 2025 Action […]
CVE-2025-54995 – Asterisk Resource Exhaustion and Leak Vulnerability
The following table lists the changes that have been made to the CVE-2025-54995 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 28, 2025 Action […]