CVE-2025-57728 – JetBrains IntelliJ IDEA Code With Me Guest File Disclosure
The following table lists the changes that have been made to the CVE-2025-57728 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 20, 2025 Action […]
CVE-2025-57727 – JetBrains IntelliJ IDEA Remote Reference Credentials Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2025-57727 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 20, 2025 Action […]
Critical Namespace Injection Vulnerability in Kubernetes Capsule Let Attackers Inject Arbitrary Labels
Critical Namespace Injection Vulnerability in Kubernetes Capsule Let Attackers Inject Arbitrary Labels A critical security vulnerability has been identified in Kubernetes Capsule v0.10.3 and earlier versions, allowing authenticated tenant users to inject arbitrary labels into system namespaces and bypa … Read more Published Date: Aug 20, 2025 (2 hours, 28 minutes ago) Vulnerabilities has been mentioned in […]
CVE-2025-9229 – MiR Error Handling Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2025-9229 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 1b7e193f-2525-49a1-b171-84af8827c9eb Aug. 20, 2025 Action […]
CVE-2025-9228 – MiR Text Note Authorization Bypass
The following table lists the changes that have been made to the CVE-2025-9228 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 1b7e193f-2525-49a1-b171-84af8827c9eb Aug. 20, 2025 Action […]
CVE-2025-5261 – Pik Online Authorization Bypass Through User-Controlled Key
The following table lists the changes that have been made to the CVE-2025-5261 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 20, 2025 Action […]
CVE-2025-5260 – Pik Online Yazılım Çözümleri A.Ş. Pik Online SSRF Vulnerability
The following table lists the changes that have been made to the CVE-2025-5260 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 20, 2025 Action […]
CVE-2024-39954 – Apache EventMesh SSRF
The following table lists the changes that have been made to the CVE-2024-39954 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 20, 2025 Action […]
Hackers Exploiting Apache ActiveMQ Vulnerability to Gain Access to Cloud Linux Systems
Hackers Exploiting Apache ActiveMQ Vulnerability to Gain Access to Cloud Linux Systems A sophisticated campaign uncovered where adversaries are exploiting CVE-2023-46604, a critical remote code execution vulnerability in Apache ActiveMQ, to compromise cloud-based Linux systems. In this … Read more Published Date: Aug 20, 2025 (1 hour, 11 minutes ago) Vulnerabilities has been mentioned in this article. […]
Paper Werewolf Exploiting WinRAR Zero‑Day Vulnerability to Deliver Malware
Paper Werewolf Exploiting WinRAR Zero‑Day Vulnerability to Deliver Malware Cybersecurity researchers have uncovered a sophisticated campaign by the Paper Werewolf threat actor group, also known as GOFFEE, targeting Russian organizations through the exploitation of critical v … Read more Published Date: Aug 20, 2025 (1 hour, 19 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-6218 […]