CVE-2025-46386 – Apache Struts Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-46386 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders
Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders A sophisticated Chinese threat actor has been exploiting critical vulnerabilities in Microsoft SharePoint to deploy an advanced malware toolset dubbed “Project AK47,” according to new research publish … Read more Published Date: Aug 06, 2025 (3 hours, 28 minutes ago) Vulnerabilities has been mentioned […]
Adobe AEM Forms 0-Day Vulnerability Let Attackers Execute Arbitrary Code
Adobe AEM Forms 0-Day Vulnerability Let Attackers Execute Arbitrary Code Adobe has released an urgent security update for Adobe Experience Manager Forms on Java Enterprise Edition (JEE) to address two critical zero-day vulnerabilities that could allow attackers to execute … Read more Published Date: Aug 06, 2025 (3 hours, 38 minutes ago) Vulnerabilities has been mentioned in […]
CVE-2025-8620 – GiveWP Information Exposure Vulnerability
The following table lists the changes that have been made to the CVE-2025-8620 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-7771 – “ThrottleStop.sys Kernel Memory Access Vulnerability”
The following table lists the changes that have been made to the CVE-2025-7771 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-6013 – Vault LDAP MFA Enforcement Weakness
The following table lists the changes that have been made to the CVE-2025-6013 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-22470 – Siemens SIMATIC CL4/6NX Plus Lua File Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-22470 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-22469 – Siemens SIMATIC S7-1200 OS Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-22469 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
Trend Micro warns of Apex One zero-day exploited in attacks
Trend Micro warns of Apex One zero-day exploited in attacks Trend Micro has warned customers to immediately secure their systems against an actively exploited remote code execution vulnerability in its Apex One endpoint security platform. Apex One is an endpoi … Read more Published Date: Aug 06, 2025 (2 hours, 22 minutes ago) Vulnerabilities has been mentioned […]
Driver of destruction: How a legitimate driver is being used to take down AV processes
Driver of destruction: How a legitimate driver is being used to take down AV processes Introduction In a recent incident response case in Brazil, we spotted intriguing new antivirus (AV) killer software that has been circulating in the wild since at least October 2024. This malicious ar … Read more Published Date: Aug 06, 2025 […]