CVE-2025-0092 – Google Android Bond Permission Bypass

The following table lists the changes that have been made to the CVE-2025-0092 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]

CVE-2025-0084 – Qualcomm Bluetooth HFP Use After Free Remote Code Execution

The following table lists the changes that have been made to the CVE-2025-0084 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]

CVE-2025-0083 – Apache HTTP Server Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2025-0083 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]

CVE-2025-0082 – Oracle Java Confused Deputy Image Disclosure

The following table lists the changes that have been made to the CVE-2025-0082 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]

CVE-2025-0081 – Adobe DNG JPEG Uninitialized Data Crash Vulnerability

The following table lists the changes that have been made to the CVE-2025-0081 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]