CVE-2025-49810 – Mattermost Information Disclosure
The following table lists the changes that have been made to the CVE-2025-49810 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 21, 2025 Action […]
CVE-2025-49222 – Mattermost File Type Validation Bypass
The following table lists the changes that have been made to the CVE-2025-49222 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 21, 2025 Action […]
CVE-2025-47870 – Mattermost Team Invite ID Disclosure
The following table lists the changes that have been made to the CVE-2025-47870 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 21, 2025 Action […]
CVE-2025-47700 – Mattermost Server Open Redirect
The following table lists the changes that have been made to the CVE-2025-47700 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 21, 2025 Action […]
Apple dicht actief aangevallen kwetsbaarheid in iOS en macOS
Apple dicht actief aangevallen kwetsbaarheid in iOS en macOS Apple heeft beveiligingsupdates uitgebracht voor een actief aangevallen beveiligingslek in iOS en macOS. Volgens het bedrijf is de kwetsbaarheid, aangeduid als CVE-2025-43300, bij een “zeer geraffinee … Read more Published Date: Aug 21, 2025 (1 hour, 7 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-43300
DOM-Based Extension Clickjacking Exposes Millions of Password Manager Users to Credential Theft
DOM-Based Extension Clickjacking Exposes Millions of Password Manager Users to Credential Theft A newly discovered technique, dubbed DOM-based extension clickjacking, has raised serious concerns about the security of browser-based password managers. Despite their role in protecting sensitive inf … Read more Published Date: Aug 21, 2025 (1 hour, 26 minutes ago) Vulnerabilities has been mentioned in this […]
CVE-2025-36530 – Mattermost Plugin Path Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-36530 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 21, 2025 Action […]
Russia’s FSB-Linked Hackers Targeting Cisco Network Gear Used in Critical Infrastructure
Russia’s FSB-Linked Hackers Targeting Cisco Network Gear Used in Critical Infrastructure How often do you hear people talking about issues of legacy systems—especially in critical infrastructure environments? Here’s another example of how deeply rooted this issue is—legacy Cisco router in … Read more Published Date: Aug 21, 2025 (1 hour, 29 minutes ago) Vulnerabilities has been mentioned […]
Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data
Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data A critical security vulnerability has been discovered in Apache Tika’s PDF parser module that could enable attackers to access sensitive data and trigger malicious requests to internal systems. The fl … Read more Published Date: Aug 21, 2025 (2 hours, 1 minute ago) Vulnerabilities has […]
Russian Hackers Exploiting 7-Year-Old Cisco Vulnerability to Collect Configs from Industrial Systems
Russian Hackers Exploiting 7-Year-Old Cisco Vulnerability to Collect Configs from Industrial Systems A Russian state-sponsored cyber espionage group designated as Static Tundra has been actively exploiting a seven-year-old vulnerability in Cisco networking devices to steal configuration data and esta … Read more Published Date: Aug 21, 2025 (2 hours, 4 minutes ago) Vulnerabilities has been mentioned in […]