CVE-2025-6573 – Qualcomm Snapdragon Secure Kernel Information Leak
The following table lists the changes that have been made to the CVE-2025-6573 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 367425dc-4d06-4041-9650-c2dc6aaa27ce Aug. 09, 2025 Action […]
CVE-2025-46709 – Apache HTTP Server Kernel Heap Information Disclosure
The following table lists the changes that have been made to the CVE-2025-46709 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 367425dc-4d06-4041-9650-c2dc6aaa27ce Aug. 09, 2025 Action […]
PyPI Rejects Malicious ZIP Archives to Block “Parser Confusion” Attacks
PyPI Rejects Malicious ZIP Archives to Block “Parser Confusion” Attacks The Python Package Index (PyPI) has announced a set of new upload restrictions aimed at protecting Python package installers and inspection tools from ZIP parser confusion attacks. This move follows t … Read more Published Date: Aug 09, 2025 (1 day ago) Vulnerabilities has been mentioned […]
CISA Alert: Critical Flaws Expose EG4 Electronics Inverters to Remote Takeover
CISA Alert: Critical Flaws Expose EG4 Electronics Inverters to Remote Takeover The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a risk evaluation warning about multiple high-severity vulnerabilities affecting all versions of several EG4 Electronics inv … Read more Published Date: Aug 09, 2025 (1 day ago) Vulnerabilities has been mentioned in this article. CVE-2025-53520 […]
CVE-2025-8743 – Scada-LTS Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-8743 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 08, 2025 Action […]