CVE-2025-20895 – Galaxy Store Authentication Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-20895 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]
CVE-2025-20894 – Samsung Email Insufficient Session Management
The following table lists the changes that have been made to the CVE-2025-20894 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]
CVE-2025-20893 – Citrix NotificationManager Configuration Hijacking
The following table lists the changes that have been made to the CVE-2025-20893 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]
CVE-2025-20892 – Asus Zenfone Bootloader Firmware Protection BypassRemote Command Execution
The following table lists the changes that have been made to the CVE-2025-20892 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]
CVE-2025-20891 – Libsthmbc.so Out-of-Bounds Read Vulnerability
The following table lists the changes that have been made to the CVE-2025-20891 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]
CVE-2025-20889 – STHMBc Out-of-Bounds Read Vulnerability
The following table lists the changes that have been made to the CVE-2025-20889 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]
CVE-2025-20888 – Apache XML Security Library Stack-Based Buffer Overflow
The following table lists the changes that have been made to the CVE-2025-20888 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]
CVE-2025-20887 – Sthmbc Out-of-Bounds Read Vulnerability
The following table lists the changes that have been made to the CVE-2025-20887 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]
CVE-2025-20886 – Softsim TA Inclusion of Sensitive Information Vulnerability (Exposure of Test Key)
The following table lists the changes that have been made to the CVE-2025-20886 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]
CVE-2025-20885 – Oracle Infrastructure Relational Database Management System Out-of-Bounds Write Vulnerability
The following table lists the changes that have been made to the CVE-2025-20885 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 04, 2025 Action […]