TheCyberThrone CyberSecurity Newsletter Top 5 Articles – January 2025
TheCyberThrone CyberSecurity Newsletter Top 5 Articles – January 2025 Welcome to TheCyberThrone cybersecurity month in review will be posted covering the important security happenings . This review is for the month ending January 2025Subscribers favorite #1Exploit Code … Read more Published Date: Feb 01, 2025 (1 hour, 29 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-55591 CVE-2024-52046 […]
CVE-2025-0943 – iSourcecode Tailoring Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-0943 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 01, 2025 Action […]
CVE-2024-13429 – “WP Job Portal Missing Validation Insecure Direct Object Reference Vulnerability”
The following table lists the changes that have been made to the CVE-2024-13429 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 01, 2025 Action […]
CVE-2024-13425 – WordPress WP Job Portal Insecure Direct Object Reference
The following table lists the changes that have been made to the CVE-2024-13425 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 01, 2025 Action […]
CVE-2024-13372 – WordPress WP Job Portal Insecure Direct Object Reference
The following table lists the changes that have been made to the CVE-2024-13372 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 01, 2025 Action […]
CVE-2024-13428 – Ac wnJobs – Insecure Direct Object Reference Vulnerability
The following table lists the changes that have been made to the CVE-2024-13428 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 01, 2025 Action […]
CVE-2024-13371 – WordPress Job Portal – Mail Server Email Sending Remote Code Execution
The following table lists the changes that have been made to the CVE-2024-13371 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 01, 2025 Action […]
CVE-2024-12825 – Custom Related Posts Plugin for WordPress Unauthorized Access & Data Modification Vulnerability
The following table lists the changes that have been made to the CVE-2024-12825 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 01, 2025 Action […]
CVE-2025-23091 – “UniFi OS Certificate Validation Weakness”
The following table lists the changes that have been made to the CVE-2025-23091 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 01, 2025 Action […]
CVE-2025-0939 – WordPress MagicForm Plugin Unauthorized Data Access and Modification Vulnerability
The MagicForm plugin for WordPress is vulnerable to access and modification of data due to a missing capability check on the plugin’s AJAX actions in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke those actions in order to delete or view logs, […]