CVE-2025-8452 – Brother Multi-Function Printer Serial Number Disclosure and Default Administrator Password Calculation Vulnerability

By using the “uscan” protocol provided by the eSCL specification, an attacker can discover the serial number of multi-function printers that implement the Brother-provided firmware. This serial number can, in turn, can be leveraged by the flaw described by CVE-2024-51978 to calculate the default administrator password. This flaw is similar to CVE-2024-51977, with the only difference […]

CVE-2025-55164 – “Prototype Pollution in Apache Content-Security-Policy-Parser”

The following table lists the changes that have been made to the CVE-2025-55164 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 12, 2025 Action […]

CVE-2025-55010 – Kanboard PHP Deserialization RCE Vulnerability

The following table lists the changes that have been made to the CVE-2025-55010 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 12, 2025 Action […]

CVE-2025-55011 – Kanboard File Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2025-55011 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 12, 2025 Action […]

CVE-2025-54864 – Hydra Unauthenticated API Calls Vulnerability

The following table lists the changes that have been made to the CVE-2025-54864 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 12, 2025 Action […]

CVE-2025-54800 – Hydra JavaScript Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-54800 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 12, 2025 Action […]

CVE-2025-3089 – ServiceNow AI Platform Broken Access Control Vulnerability

The following table lists the changes that have been made to the CVE-2025-3089 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 12, 2025 Action […]

CVE-2025-38500 – Linux Kernel xfrm Interface Use-After-Free Vulnerability

In the Linux kernel, the following vulnerability has been resolved: xfrm: interface: fix use-after-free after changing collect_md xfrm interface collect_md property on xfrm interfaces can only be set on device creation, thus xfrmi_changelink() should fail when called on such interfaces. The check to enforce this was done only in the case where the xi was […]

17,000+ VMware ESXi Servers Vulnerable to Critical Integer-Overflow Vulnerability

17,000+ VMware ESXi Servers Vulnerable to Critical Integer-Overflow Vulnerability More than 17,000 VMware ESXi installations worldwide are at risk from a severe integer-overflow vulnerability tracked as CVE-2025-41236 (CVSS 9.3), cybersecurity researchers warn. This critical vulner … Read more Published Date: Aug 12, 2025 (1 hour, 17 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-41236 CVE-2025-6543 […]

Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges

Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges Zoom has disclosed a critical vulnerability affecting multiple Windows-based clients, potentially allowing attackers to escalate privileges and compromise user systems. Designated as CVE-2025-49457 un … Read more Published Date: Aug 12, 2025 (1 hour, 34 minutes ago) Vulnerabilities has been mentioned in this article.