CVE-2025-8801 – Open5GS Denial of Service Vulnerability

The following table lists the changes that have been made to the CVE-2025-8801 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]

CVE-2025-8800 – Open5GS AMF Component Denial of Service Vulnerability

The following table lists the changes that have been made to the CVE-2025-8800 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]

CVE-2025-8799 – Open5GS AMF Denial of Service Vulnerability

The following table lists the changes that have been made to the CVE-2025-8799 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]

CVE-2025-8798 – Samarium Unrestricted File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2025-8798 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]

CVE-2025-8797 – “LitmusChaos Litmus LocalStorage Handler Remote Permission Vulnerability”

The following table lists the changes that have been made to the CVE-2025-8797 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]

CVE-2025-8796 – LitmusChaos Litmus Missing Authorization Vulnerability

The following table lists the changes that have been made to the CVE-2025-8796 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]

CVE-2025-8795 – LitmusChaos Litmus Remote File Inclusion Vulnerability

The following table lists the changes that have been made to the CVE-2025-8795 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]

CVE-2025-8794 – LitmusChaos Litmus LocalStorage Handler Authorization Bypass

The following table lists the changes that have been made to the CVE-2025-8794 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]

CVE-2025-8793 – “LitmusChaos Litmus Remote Resource Identifier Improper Control Vulnerability”

The following table lists the changes that have been made to the CVE-2025-8793 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 10, 2025 Action […]