CVE-2025-8556 – CIRCL FourQ Elliptic Curve Diffie-Hellman Key Exchange Session Compromise

The following table lists the changes that have been made to the CVE-2025-8556 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]

CVE-2025-7202 – Elgato Key Lights CSRF Vulnerability

The following table lists the changes that have been made to the CVE-2025-7202 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 1c6b5737-9389-4011-8117-89fa251edfb2 Aug. 06, 2025 Action […]

Trend Micro waarschuwt voor actief misbruik van Apex One-lek

Trend Micro waarschuwt voor actief misbruik van Apex One-lek Antivirusbedrijf Trend Micro waarschuwt klanten voor actief misbruik van een kritieke kwetsbaarheid in endpoint security platform Apex One en heeft een tijdelijke oplossing uitgebracht om organisaties … Read more Published Date: Aug 06, 2025 (1 hour, 14 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-54987 CVE-2025-54948

Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems

Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems Aug 06, 2025Ravie LakshmananVulnerability / Endpoint Security Trend Micro has released mitigations to address critical security flaws in on-premise versions of Apex One Management Console that it sa … Read more Published Date: Aug 06, 2025 (3 hours, 31 minutes ago) Vulnerabilities has been […]

CVE-2025-21479 and 27038 Actively Exploited, Google Issues Emergency Android Patches

CVE-2025-21479 and 27038 Actively Exploited, Google Issues Emergency Android Patches Google has released its latest Android Security Bulletin for August 2025, addressing multiple vulnerabilities across the Android ecosystem. Among the most notable vulnerabilities, CVE-2025-21479 and C … Read more Published Date: Aug 06, 2025 (1 hour, 42 minutes ago) Vulnerabilities has been mentioned in this article.

VS meldt misbruik van lekken in ip-camera’s en digitale videorecorder D-Link

VS meldt misbruik van lekken in ip-camera’s en digitale videorecorder D-Link Het Amerikaanse cyberagentschap CISA meldt dat aanvallers misbruik maken, of hebben gemaakt, van oude kwetsbaarheden in ip-camera’s en een digitale videorecorder van fabrikant D-Link. Afgelopen decemb … Read more Published Date: Aug 06, 2025 (1 hour, 53 minutes ago) Vulnerabilities has been mentioned in this article. […]

Elon Musk Finally Open Sources Grok 2, Rekindling Rivalry with OpenAI’s New Open-Weight Models

Elon Musk Finally Open Sources Grok 2, Rekindling Rivalry with OpenAI’s New Open-Weight Models Recently, OpenAI announced the open-sourcing of the GPT-OSS-20B and GPT-OSS-120B models—large language models specifically trained for open-source purposes. In terms of capability, these models are sa … Read more Published Date: Aug 06, 2025 (14 hours, 25 minutes ago) Vulnerabilities has been mentioned […]

CVE-2025-7954 – Shopware Voucher System Race Condition

The following table lists the changes that have been made to the CVE-2025-7954 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 551230f0-3615-47bd-b7cc-93e92e730bbf Aug. 06, 2025 Action […]

CVE-2025-27076 – Citrix NetScaler Memory Corruption Vulnerability

The following table lists the changes that have been made to the CVE-2025-27076 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]

CVE-2025-27075 – Qualcomm Bluetooth Host Memory Corruption Vulnerability

The following table lists the changes that have been made to the CVE-2025-27075 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]