CVE-2025-43201 – Apple Music Classical Credential Disclosure
The following table lists the changes that have been made to the CVE-2025-43201 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-8959 – HashiCorp Go-Getter Symlink Read Access Vulnerability
The following table lists the changes that have been made to the CVE-2025-8959 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-44201 – Apache None-Severity
The following table lists the changes that have been made to the CVE-2025-44201 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Aug. 15, 2025 Action Type […]
Qilin Remains Top Ransomware Group as Attacks Rise
Qilin Remains Top Ransomware Group as Attacks Rise Qilin continues to stake a claim as the top ransomware group in the wake of the decline of RansomHub earlier this year. In July, Qilin led all ransomware groups in claimed victims for the third time i … Read more Published Date: Aug 15, 2025 (1 hour, 37 minutes […]
CVE-2025-36088 – IBM TS4500 Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-36088 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-43490 – HP Hotkey Support HPAAudioAnalytics Escalation of Privilege Vulnerability
The following table lists the changes that have been made to the CVE-2025-43490 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-55285 – Backstage Plugin Scaffolder Backend Information Disclosure
The following table lists the changes that have been made to the CVE-2025-55285 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-9060 – MSoft MFlash Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-9060 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-8996 – Drupal Layout Builder Advanced Permissions Missing Authorization
The following table lists the changes that have been made to the CVE-2025-8996 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-8995 – Drupal Authenticator Login Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-8995 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]