CVE-2025-0325 – Axis Guard Tour VAPIX API Parameter Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-0325 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]

CVE-2025-0324 – VAPIX Device Configuration Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-0324 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]

CISA Warns of Consilium Fire Panel Vulnerabilities Allowing Remote Takeover

CISA Warns of Consilium Fire Panel Vulnerabilities Allowing Remote Takeover CISA has issued a critical advisory warning of two severe security vulnerabilities affecting all versions of the Consilium Safety CS5000 Fire Panel, a widely deployed industrial control system used in … Read more Published Date: Jun 02, 2025 (2 hours, 54 minutes ago) Vulnerabilities has been mentioned […]

CVE-2025-4010: ONEKEY Uncovers Critical Remote Code Execution Flaw in Netcomm/Lantronix 4G Gateways

CVE-2025-4010: ONEKEY Uncovers Critical Remote Code Execution Flaw in Netcomm/Lantronix 4G Gateways A newly disclosed vulnerability affecting Netcomm Wireless devices—now under Lantronix ownership—has been assigned CVE-2025-4010, and it poses a serious security risk to industrial and telecommunicati … Read more Published Date: Jun 02, 2025 (51 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-4010

CVE-2025-5434 – Aem Solutions CMS SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-5434 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]

CVE-2025-5433 – Fengoffice SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-5433 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]

CVE-2025-4010 – Netcom NTC 6200 and NWL 222 Web Interface Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-4010 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]

CVE-2025-1235 – Cisco Switch Date Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-1235 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 02, 2025 Action […]

Red Hat Unveils llm-d: Scaling Generative AI for the Enterprise

Red Hat Unveils llm-d: Scaling Generative AI for the Enterprise Red Hat has recently unveiled an open-source initiative named llm-d, designed to address the most critical demand of the generative AI era: large-scale inference. The llm-d project is a collaborative … Read more Published Date: Jun 02, 2025 (1 hour, 32 minutes ago) Vulnerabilities has been mentioned […]

Apple’s AI Race: Is the Tech Giant Falling Behind?

Apple’s AI Race: Is the Tech Giant Falling Behind? In his “Power On” column, Bloomberg journalist Mark Gurman reported that some Apple employees have expressed a sense of pessimism regarding the company’s progress in artificial intelligence developmen … Read more Published Date: Jun 02, 2025 (1 hour, 40 minutes ago) Vulnerabilities has been mentioned in this article. […]