CVE-2025-25060 – AssetView Unauthenticated File Access and Deletion Vulnerability

The following table lists the changes that have been made to the CVE-2025-25060 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]

CISA Flags Apache Tomcat CVE-2025-24813 as Actively Exploited with 9.8 CVSS

CISA Flags Apache Tomcat CVE-2025-24813 as Actively Exploited with 9.8 CVSS A critical vulnerability in Apache Tomcat, now actively exploited in the wild, has landed in the CISA Known Exploited Vulnerabilities Catalog with a top-tier CVSS score of 9.8. Identified as CVE-2025- … Read more Published Date: Apr 02, 2025 (1 hour, 51 minutes ago) Vulnerabilities has […]

Chrome 135: 14 Security Fixes, High-Severity CVE-2025-3066 Flaw Patched

Chrome 135: 14 Security Fixes, High-Severity CVE-2025-3066 Flaw Patched Google’s Chrome team has officially rolled out Chrome 135 to the Stable Channel for Windows, macOS, and Linux, bringing a wave of security enhancements, bug fixes, and under-the-hood improvements to b … Read more Published Date: Apr 02, 2025 (2 hours, 10 minutes ago) Vulnerabilities has been mentioned […]

CVE-2025-3074 – Google Chrome UI Spoofing Vulnerability

The following table lists the changes that have been made to the CVE-2025-3074 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]

CVE-2025-3072 – Google Chrome Custom Tabs UI Spoofing Vulnerability

The following table lists the changes that have been made to the CVE-2025-3072 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]

CVE-2025-3071 – Google Chrome Navigation Same-Origin Policy Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-3071 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]

CVE-2025-3070 – Google Chrome Extension Input Validation Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-3070 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]

CVE-2025-3068 – Google Chrome Android Intents Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-3068 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]

CVE-2025-3069 – Google Chrome Extension Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-3069 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]