CVE-2025-56694 – Lumasoft fotoShare Cloud Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-56694 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
CVE-2025-43882 – Dell ThinOS Unverified Ownership Unauthorized Access
The following table lists the changes that have been made to the CVE-2025-43882 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
CVE-2025-43730 – Dell ThinOS Command Argument Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-43730 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
CVE-2025-43729 – Dell ThinOS Incorrect Permission Assignment for Critical Resource Vulnerability
The following table lists the changes that have been made to the CVE-2025-43729 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
CVE-2025-43728 – Dell ThinOS Protection Mechanism Failure Remote Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-43728 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression
New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression A newly observed variant of the Zip Slip vulnerability has emerged, enabling threat actors to exploit path traversal flaws in widely used decompression utilities. Exploits leveraging this vulnerabilit … Read more Published Date: Aug 27, 2025 (1 hour, 17 minutes ago) Vulnerabilities has been mentioned […]
Docker Desktop Vulnerability Allowed Host Takeover on Windows, macOS
Docker Desktop Vulnerability Allowed Host Takeover on Windows, macOS A critical vulnerability (CVE-2025-9074) in Docker Desktop for Windows and macOS was fixed. The flaw allowed a malicious container to escape and gain administrator access to the host computer. A secur … Read more Published Date: Aug 27, 2025 (9 hours, 48 minutes ago) Vulnerabilities has been mentioned […]
ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots
ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government entities within Central Asia and Asia-Pacific (APAC). According to Group-IB, nearly thr … Read more Published Date: Aug 27, 2025 (1 hour, 22 minutes ago) Vulnerabilities […]
CVE-2025-9526 – Linksys E1700 Remote Stack-Based Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-9526 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]
CVE-2025-9525 – Linksys E1700 Stack-Based Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-9525 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 27, 2025 Action […]