CVE-2025-2181 – Palo Alto Networks Checkov Prisma Cloud Sensitive Information Disclosure

The following table lists the changes that have been made to the CVE-2025-2181 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]

CVE-2025-51451 – TOTOLINK EX1200T Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-51451 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]

CVE-2025-2180 – Palo Alto Networks Checkov by Prisma Cloud Deserialization Vulnerability

The following table lists the changes that have been made to the CVE-2025-2180 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]

Pennsylvania attorney general’s email, site down after cyberattack

Pennsylvania attorney general’s email, site down after cyberattack The Office of the Pennsylvania Attorney General has announced that a recent cyberattack has taken down its systems, including landline phone lines and email accounts. As Attorney General Dave Sunday r … Read more Published Date: Aug 13, 2025 (2 hours, 44 minutes ago) Vulnerabilities has been mentioned in […]

CVE-2025-8918 – Portabilis i-Educar Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-8918 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]

CVE-2025-51452 – TOTOLINK A7000R Authentication Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-51452 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]

CVE-2025-50614 – Netis WF2880 Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-50614 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]

CVE-2025-50613 – Netis WF2880 Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-50613 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]

CVE-2025-50609 – Netis WF2880 Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-50609 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]

CVE-2025-50612 – Netis WF2880 Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-50612 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 13, 2025 Action […]