CVE-2025-8836 – JasPer JPEG2000 Encoder Reachable Assertion Vulnerability
The following table lists the changes that have been made to the CVE-2025-8836 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]
CVE-2025-8747 – Keras Safe Mode Bypass Arbitrary Code Execution
The following table lists the changes that have been made to the CVE-2025-8747 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]
CVE-2025-8661 – Apache Server Stored XSS
The following table lists the changes that have been made to the CVE-2025-8661 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]
CVE-2025-8660 – Apache Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-8660 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]
WinRAR 0-Day in Phishing Attacks to Deploy RomCom Malware
WinRAR 0-Day in Phishing Attacks to Deploy RomCom Malware A critical zero-day vulnerability has been identified in WinRAR that cybercriminals are actively exploiting through sophisticated phishing campaigns to distribute RomCom malware. The flaw, designated … Read more Published Date: Aug 11, 2025 (2 hours, 35 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-8088
CVE-2025-8835 – JasPer Jas Image Color Space Conversion Handler Null Pointer Dereference
The following table lists the changes that have been made to the CVE-2025-8835 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]
CVE-2025-8834 – JCG Link-net LW-N915R Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-8834 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]
CVE-2025-8833 – Linksys RE Series Stack-Based Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-8833 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]
BadCam Attack Turns Trusted Linux Webcams into Stealthy USB Weapons
BadCam Attack Turns Trusted Linux Webcams into Stealthy USB Weapons A new class of USB-based attacks has come to light. These attacks are not just targeting removable devices, but existing, trusted peripherals already connected to systems: Linux webcams. Attackers can … Read more Published Date: Aug 11, 2025 (1 hour, 14 minutes ago) Vulnerabilities has been mentioned […]
CVE-2025-8832 – Linksys WAP Stack-Based Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-8832 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 11, 2025 Action […]