CVE-2025-64330 – Suricata is vulnerable to a heap buffer overflow on verdict

The following table lists the changes that have been made to the CVE-2025-64330 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 26, 2025 Action […]

CVE-2020-36874 – ACE SECURITY WIP-90113 Unauthenticated Configuration Disclosure

The following table lists the changes that have been made to the CVE-2020-36874 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 26, 2025 Action […]

CVE-2020-36871 – ESCAM QD-900 Unauthenticated Configuration Disclosure

The following table lists the changes that have been made to the CVE-2020-36871 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 26, 2025 Action […]

CVE-2025-62593 – Ray is vulnerable to RCE via Safari & Firefox Browsers through DNS Rebinding Attack

The following table lists the changes that have been made to the CVE-2025-62593 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 26, 2025 Action […]

CVE-2025-40934 – XML-Sig prior to 0.68 for Perl improperly validates XML without signatures

The following table lists the changes that have been made to the CVE-2025-40934 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 9b29abf9-4ab0-4765-b253-1875cd9b441e Nov. 26, 2025 Action […]

CVE-2020-36873 – Astak CM-818T3 Unauthenticated Configuration Disclosure

The following table lists the changes that have been made to the CVE-2020-36873 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 26, 2025 Action […]

CVE-2020-36872 – BACnet Test Server 1.01 Malformed BVLC Length DoS

The following table lists the changes that have been made to the CVE-2020-36872 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 26, 2025 Action […]

CVE-2019-25227 – Tellion HN-2204AP Unauthenticated Configuration Disclosure

The following table lists the changes that have been made to the CVE-2019-25227 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 26, 2025 Action […]

CVE-2019-25226 – Dongyoung Media DM-AP240T/W Unauthenticated Configuration Disclosure

The following table lists the changes that have been made to the CVE-2019-25226 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Nov. 26, 2025 Action […]