CVE-2025-8556 – CIRCL FourQ Elliptic Curve Diffie-Hellman Key Exchange Session Compromise
The following table lists the changes that have been made to the CVE-2025-8556 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-7202 – Elgato Key Lights CSRF Vulnerability
The following table lists the changes that have been made to the CVE-2025-7202 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 1c6b5737-9389-4011-8117-89fa251edfb2 Aug. 06, 2025 Action […]
Trend Micro waarschuwt voor actief misbruik van Apex One-lek
Trend Micro waarschuwt voor actief misbruik van Apex One-lek Antivirusbedrijf Trend Micro waarschuwt klanten voor actief misbruik van een kritieke kwetsbaarheid in endpoint security platform Apex One en heeft een tijdelijke oplossing uitgebracht om organisaties … Read more Published Date: Aug 06, 2025 (1 hour, 14 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-54987 CVE-2025-54948
Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems
Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems Aug 06, 2025Ravie LakshmananVulnerability / Endpoint Security Trend Micro has released mitigations to address critical security flaws in on-premise versions of Apex One Management Console that it sa … Read more Published Date: Aug 06, 2025 (3 hours, 31 minutes ago) Vulnerabilities has been […]
CVE-2025-21479 and 27038 Actively Exploited, Google Issues Emergency Android Patches
CVE-2025-21479 and 27038 Actively Exploited, Google Issues Emergency Android Patches Google has released its latest Android Security Bulletin for August 2025, addressing multiple vulnerabilities across the Android ecosystem. Among the most notable vulnerabilities, CVE-2025-21479 and C … Read more Published Date: Aug 06, 2025 (1 hour, 42 minutes ago) Vulnerabilities has been mentioned in this article.
VS meldt misbruik van lekken in ip-camera’s en digitale videorecorder D-Link
VS meldt misbruik van lekken in ip-camera’s en digitale videorecorder D-Link Het Amerikaanse cyberagentschap CISA meldt dat aanvallers misbruik maken, of hebben gemaakt, van oude kwetsbaarheden in ip-camera’s en een digitale videorecorder van fabrikant D-Link. Afgelopen decemb … Read more Published Date: Aug 06, 2025 (1 hour, 53 minutes ago) Vulnerabilities has been mentioned in this article. […]
Elon Musk Finally Open Sources Grok 2, Rekindling Rivalry with OpenAI’s New Open-Weight Models
Elon Musk Finally Open Sources Grok 2, Rekindling Rivalry with OpenAI’s New Open-Weight Models Recently, OpenAI announced the open-sourcing of the GPT-OSS-20B and GPT-OSS-120B models—large language models specifically trained for open-source purposes. In terms of capability, these models are sa … Read more Published Date: Aug 06, 2025 (14 hours, 25 minutes ago) Vulnerabilities has been mentioned […]
CVE-2025-7954 – Shopware Voucher System Race Condition
The following table lists the changes that have been made to the CVE-2025-7954 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 551230f0-3615-47bd-b7cc-93e92e730bbf Aug. 06, 2025 Action […]
CVE-2025-27076 – Citrix NetScaler Memory Corruption Vulnerability
The following table lists the changes that have been made to the CVE-2025-27076 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-27075 – Qualcomm Bluetooth Host Memory Corruption Vulnerability
The following table lists the changes that have been made to the CVE-2025-27075 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]