CVE-2025-8515 – Intelbras InControl JSON Endpoint Information Disclosure

The following table lists the changes that have been made to the CVE-2025-8515 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

Bitdefender Warns Users to Update Dahua Cameras Over Critical Flaws

Bitdefender Warns Users to Update Dahua Cameras Over Critical Flaws A set of two security vulnerabilities has been found in a widely used line of Dahua security cameras, exposing devices to full remote takeover. The research firm Bitdefender, which shared its findings … Read more Published Date: Aug 04, 2025 (9 hours, 6 minutes ago) Vulnerabilities has […]

Cyber Brief 25-08 – July 2025

Cyber Brief 25-08 – July 2025 Cyber Brief (July 2025)August 4, 2025 – Version: 1TLP:CLEARExecutive summaryWe analysed 287 open source reports for this Cyber Brief1.Relating to cyber policy and law enforcement, the EU, UK, and US h … Read more Published Date: Aug 04, 2025 (9 hours, 13 minutes ago) Vulnerabilities has been mentioned in this article. […]

CVE-2025-6205 – “DELmia Apriso Authorization Bypass Vulnerability”

The following table lists the changes that have been made to the CVE-2025-6205 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-6204 – DELmia Apriso Code Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-6204 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-0932 – Arm Ltd Bifrost GPU Userspace Driver/Arm Ltd Valhall GPU Userspace Driver/Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver: After Free Information Disclosure

Use After Free vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to perform valid GPU processing operations, including via WebGL or WebGPU, to gain access to already freed memory.This issue affects Bifrost GPU Userspace Driver: […]

Critical HashiCorp Vulnerability Let Attackers Execute Arbitrary Code on Underlying Host

Critical HashiCorp Vulnerability Let Attackers Execute Arbitrary Code on Underlying Host A critical HashiCorp security vulnerability affecting Vault Community Edition and Enterprise versions could allow privileged operators to execute arbitrary code on underlying host systems. The vulnera … Read more Published Date: Aug 04, 2025 (2 hours, 7 minutes ago) Vulnerabilities has been mentioned in this article. […]

TheCyberThrone CyberSecurity Newsletter Top 5 Articles – July 2025

TheCyberThrone CyberSecurity Newsletter Top 5 Articles – July 2025 August 4, 2025Welcome to TheCyberThrone cybersecurity month in review will be posted covering the important security happenings . This review is for the month ending July 2025Subscribers favorite #1Ni … Read more Published Date: Aug 04, 2025 (2 hours, 46 minutes ago) Vulnerabilities has been mentioned in this […]

CVE-2025-8341 – Grafana Infinity Datasource URL Bypass Vulnerability

Grafana is an open-source platform for monitoring and observability. The Infinity datasource plugin, maintained by Grafana Labs, allows visualizing data from JSON, CSV, XML, GraphQL, and HTML endpoints. If the plugin was configured to allow only certain URLs, an attacker could bypass this restriction using a specially crafted URL. This vulnerability is fixed in version […]

AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction

AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction A severe vulnerability in the popular AI-powered code editor Cursor IDE, dubbed “CurXecute,” allows attackers to execute arbitrary code on developers’ machines without any user interaction. The vulner … Read more Published Date: Aug 04, 2025 (3 hours, 2 minutes ago) Vulnerabilities has been mentioned in this […]