CVE-2025-8907 – H3C M2 NAS Webserver Configuration Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-8907 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]

CVE-2025-8671 – Apache HTTP/2 Denial-of-Service Vulnerability

The following table lists the changes that have been made to the CVE-2025-8671 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]

CVE-2025-48989 – Apache Tomcat Reset Attack Vulnerability

The following table lists the changes that have been made to the CVE-2025-48989 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]

CVE-2025-55280 – ZKTeco WL20 PlainText Data Exposure Vulnerability

The following table lists the changes that have been made to the CVE-2025-55280 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]

CVE-2025-55279 – ZKTeco WL20 Hard-Coded Private Key Vulnerability

The following table lists the changes that have been made to the CVE-2025-55279 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]

CVE-2025-54465 – ZKTeco WL20 Hard-Coded MQTT Credentials Disclosure

The following table lists the changes that have been made to the CVE-2025-54465 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]

CVE-2025-54464 – ZKTeco WL20 Unencrypted Credentials Storage

The following table lists the changes that have been made to the CVE-2025-54464 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]

Microsoft Teams CVE-2025-53783 Vulnerability Could Allow Remote Code Execution

Microsoft Teams CVE-2025-53783 Vulnerability Could Allow Remote Code Execution Microsoft has disclosed a serious vulnerability in its collaboration platform, Microsoft Teams, that could open the door to Remote Code Execution (RCE) attacks. The flaw, tracked as CVE-2025-53783, ca … Read more Published Date: Aug 13, 2025 (48 minutes ago) Vulnerabilities has been mentioned in this article. […]

Microsoft fixes “BadSuccessor” Kerberos vulnerability (CVE-2025-53779)

Microsoft fixes “BadSuccessor” Kerberos vulnerability (CVE-2025-53779) For August 2025 Patch Tuesday, Microsoft has released security updates resolving 100+ security vulnerabilities in its various solutions, including a relative path traversal flaw in Windows Kerberos (C … Read more Published Date: Aug 13, 2025 (54 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-25256 CVE-2025-53779 CVE-2025-53778 CVE-2025-53766 […]

FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User

FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User A critical authentication bypass vulnerability in FortiWeb allows unauthenticated remote attackers to impersonate any existing user on affected systems. The vulnerability, tracked as CVE-2025-52970 wi … Read more Published Date: Aug 13, 2025 (57 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-52970