CVE-2025-36613 – Dell SupportAssist Incorrect Privilege Assignment Vulnerability

The following table lists the changes that have been made to the CVE-2025-36613 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]

CVE-2025-27847 – ESPEC North America Web Controller Authentication Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-27847 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]

CVE-2025-38738 – Dell SupportAssist Incorrect Privilege Assignment

The following table lists the changes that have been made to the CVE-2025-38738 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]

CVE-2025-36612 – Dell SupportAssist Incorrect Privilege Assignment Vulnerability

The following table lists the changes that have been made to the CVE-2025-36612 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]

CVE-2025-27846 – ESPEC North America Web Controller Bootloader Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-27846 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]

CVE-2025-27845 – ESPEC North America Web Controller Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-27845 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]

CVE-2025-26484 – Dell CloudLink XML External Entity Reference Denial of Service Vulnerability

The following table lists the changes that have been made to the CVE-2025-26484 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]

Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability

Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability A cyberattack hit the Canadian House of Commons on August 9, 2025, when threat actors exploited a recently disclosed Microsoft vulnerability to gain unauthorized access to sensitive employee informati … Read more Published Date: Aug 14, 2025 (2 hours, 45 minutes ago) Vulnerabilities has been mentioned […]

CVE-2025-9036 – Citrix Workspace Token Replay Vulnerability

The following table lists the changes that have been made to the CVE-2025-9036 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]