CVE-2025-0092 – Google Android Bond Permission Bypass
The following table lists the changes that have been made to the CVE-2025-0092 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]
CVE-2025-0084 – Qualcomm Bluetooth HFP Use After Free Remote Code Execution
The following table lists the changes that have been made to the CVE-2025-0084 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]
CVE-2025-0083 – Apache HTTP Server Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2025-0083 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]
CVE-2025-0082 – Oracle Java Confused Deputy Image Disclosure
The following table lists the changes that have been made to the CVE-2025-0082 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]
CVE-2025-0081 – Adobe DNG JPEG Uninitialized Data Crash Vulnerability
The following table lists the changes that have been made to the CVE-2025-0081 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 26, 2025 Action […]