CVE-2025-20707 – Geniezone Use After Free Memory Corruption Vulnerability

The following table lists the changes that have been made to the CVE-2025-20707 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 01, 2025 Action […]

CVE-2025-20706 – mbrain Use After Free Memory Corruption Vulnerability

The following table lists the changes that have been made to the CVE-2025-20706 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 01, 2025 Action […]

CVE-2025-20705 – Citrix Hypervisor Memory Corruption (Use After Free)

The following table lists the changes that have been made to the CVE-2025-20705 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 01, 2025 Action […]

CVE-2025-20704 – “ZTE Modem Out-of-Bounds Write Privilege Escalation Vulnerability”

The following table lists the changes that have been made to the CVE-2025-20704 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 01, 2025 Action […]

CVE-2025-20703 – Huawei Modem Out-of-Bounds Read Remote Denial of Service Vulnerability

The following table lists the changes that have been made to the CVE-2025-20703 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 01, 2025 Action […]

Linux UDisks Daemon Vulnerability Allows Attackers Access to Privileged User Files

Linux UDisks Daemon Vulnerability Allows Attackers Access to Privileged User Files A critical security vulnerability has been discovered in the Linux UDisks daemon that could allow unprivileged attackers to gain access to files owned by privileged users. The flaw, identified as CVE- … Read more Published Date: Sep 01, 2025 (3 hours, 1 minute ago) Vulnerabilities has […]

CISA Releases Nine ICS Advisories Surrounding Vulnerabilities, and Exploits

CISA Releases Nine ICS Advisories Surrounding Vulnerabilities, and Exploits The Cybersecurity and Infrastructure Security Agency (CISA) has published nine Industrial Control Systems (ICS) advisories on August 28, 2025, detailing high- and medium-severity vulnerabilities acros … Read more Published Date: Sep 01, 2025 (3 hours, 7 minutes ago) Vulnerabilities has been mentioned in this article.