CVE-2025-56694 – Lumasoft fotoShare Cloud Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-56694 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2025-43882 – Dell ThinOS Unverified Ownership Unauthorized Access

The following table lists the changes that have been made to the CVE-2025-43882 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2025-43730 – Dell ThinOS Command Argument Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-43730 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2025-43729 – Dell ThinOS Incorrect Permission Assignment for Critical Resource Vulnerability

The following table lists the changes that have been made to the CVE-2025-43729 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2025-43728 – Dell ThinOS Protection Mechanism Failure Remote Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-43728 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression

New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression A newly observed variant of the Zip Slip vulnerability has emerged, enabling threat actors to exploit path traversal flaws in widely used decompression utilities. Exploits leveraging this vulnerabilit … Read more Published Date: Aug 27, 2025 (1 hour, 17 minutes ago) Vulnerabilities has been mentioned […]

Docker Desktop Vulnerability Allowed Host Takeover on Windows, macOS

Docker Desktop Vulnerability Allowed Host Takeover on Windows, macOS A critical vulnerability (CVE-2025-9074) in Docker Desktop for Windows and macOS was fixed. The flaw allowed a malicious container to escape and gain administrator access to the host computer. A secur … Read more Published Date: Aug 27, 2025 (9 hours, 48 minutes ago) Vulnerabilities has been mentioned […]

ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots

ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government entities within Central Asia and Asia-Pacific (APAC). According to Group-IB, nearly thr … Read more Published Date: Aug 27, 2025 (1 hour, 22 minutes ago) Vulnerabilities […]

CVE-2025-9526 – Linksys E1700 Remote Stack-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-9526 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]

CVE-2025-9525 – Linksys E1700 Stack-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-9525 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]