CVE-2025-29745

creation_timestamp| type| source ---|---|--- 2025-08-06 21:02:26+00:00| seen|...Read More ...

Continue Reading
CVE-2025-8667

creation_timestamp| type| source ---|---|--- 2025-08-06 21:05:23+00:00| seen|...Read More ...

Continue Reading
CVE-2025-54962

creation_timestamp| type| source ---|---|--- 2025-08-06 21:02:40+00:00| seen|...Read More ...

Continue Reading
CVE-2025-54554

creation_timestamp| type| source ---|---|--- 2025-08-06 21:02:38+00:00| seen|...Read More ...

Continue Reading
CVE-2025-51054

Vedo Suite 2024.17 is vulnerable to Incorrect Access Control, which allows remote attackers to obtain a valid high privilege JWT token without prior authentication via sending an empty HTTP POST reque ...

Continue Reading
Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft

Cybersecurity researchers have demonstrated an "end-to-end privilege escalation chain" in Amazon Elastic Container Service (ECS) that could be exploited by an attacker to conduct lat ...

Continue Reading
CVE-2025-7770

Tigo Energy's CCA device is vulnerable to insecure session ID generation in their remote API. The session IDs are generated using a predictable method based on the current timestamp, allowing att ...

Continue Reading
CVE-2025-51054

Vedo Suite 2024.17 is vulnerable to Incorrect Access Control, which allows remote attackers to obtain a valid high privilege JWT token without prior authentication via sending an empty HTTP POST reque ...

Continue Reading

Back to Main

Subscribe for the latest news: