CVE-2025-46386 – Apache Struts Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-46386 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]

Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders

Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders A sophisticated Chinese threat actor has been exploiting critical vulnerabilities in Microsoft SharePoint to deploy an advanced malware toolset dubbed “Project AK47,” according to new research publish … Read more Published Date: Aug 06, 2025 (3 hours, 28 minutes ago) Vulnerabilities has been mentioned […]

Adobe AEM Forms 0-Day Vulnerability Let Attackers Execute Arbitrary Code

Adobe AEM Forms 0-Day Vulnerability Let Attackers Execute Arbitrary Code Adobe has released an urgent security update for Adobe Experience Manager Forms on Java Enterprise Edition (JEE) to address two critical zero-day vulnerabilities that could allow attackers to execute … Read more Published Date: Aug 06, 2025 (3 hours, 38 minutes ago) Vulnerabilities has been mentioned in […]

CVE-2025-8620 – GiveWP Information Exposure Vulnerability

The following table lists the changes that have been made to the CVE-2025-8620 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]

CVE-2025-7771 – “ThrottleStop.sys Kernel Memory Access Vulnerability”

The following table lists the changes that have been made to the CVE-2025-7771 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]

CVE-2025-6013 – Vault LDAP MFA Enforcement Weakness

The following table lists the changes that have been made to the CVE-2025-6013 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]

CVE-2025-22470 – Siemens SIMATIC CL4/6NX Plus Lua File Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-22470 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]

CVE-2025-22469 – Siemens SIMATIC S7-1200 OS Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-22469 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]

Trend Micro warns of Apex One zero-day exploited in attacks

Trend Micro warns of Apex One zero-day exploited in attacks Trend Micro has warned customers to immediately secure their systems against an actively exploited remote code execution vulnerability in its Apex One endpoint security platform. Apex One is an endpoi … Read more Published Date: Aug 06, 2025 (2 hours, 22 minutes ago) Vulnerabilities has been mentioned […]