CVE-2025-26943 – Jürgen Müller Easy Quotes SQL Injection

The following table lists the changes that have been made to the CVE-2025-26943 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]

CVE-2025-26915 – PickPlugins Wishlist SQL Injection

The following table lists the changes that have been made to the CVE-2025-26915 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]

CVE-2025-26900 – Flexmls Flexmls IDX Object Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-26900 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]

CVE-2025-26752 – VideoWhisper Live Streaming Integration Path Traversal

The following table lists the changes that have been made to the CVE-2025-26752 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]

CVE-2023-25574 – Jupyterhub-LTIAuthenticator JWT Signature Validation Bypass

The following table lists the changes that have been made to the CVE-2023-25574 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]

CVE-2025-1262 – Google reCaptcha for WordPress CAPTCHA Bypass Vulnerability

CVE ID : CVE-2025-1262 Published : Feb. 25, 2025, 1:15 p.m. | 56 minutes ago Description : The Advanced Google reCaptcha plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to, and including, 1.27 . This makes it possible for unauthenticated attackers to bypass the Built-in Math Captcha Verification. Severity: 5.3 | MEDIUM Visit […]

Linux Grub Read Command Buffer Overflow Vulnerability Enabling Potential Secure Boot Bypass

Linux Grub Read Command Buffer Overflow Vulnerability Enabling Potential Secure Boot Bypass A newly disclosed vulnerability in the GRUB2 bootloader’s read command (CVE-2025-0690) has raised concerns about potential Secure Boot bypasses and heap memory corruption in Linux systems. Red Hat Pro … Read more Published Date: Feb 25, 2025 (3 hours, 8 minutes ago) Vulnerabilities has been […]

Securitybedrijf meldt actief misbruik van jarenoude Cisco-kwetsbaarheden

Securitybedrijf meldt actief misbruik van jarenoude Cisco-kwetsbaarheden Aanvallers maken actief misbruik van jarenoude kwetsbaarheden in apparatuur van Cisco, waaronder een kritiek beveiligingslek dat sinds 28 maart 2018 bekend is. Dat laat securitybedrijf GreyNoise op ba … Read more Published Date: Feb 25, 2025 (1 hour, 44 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2023-20273 CVE-2023-20198 […]

Sliver C2 Server Vulnerability Let Attackers Open a TCP connection to Read Traffic

Sliver C2 Server Vulnerability Let Attackers Open a TCP connection to Read Traffic A critical server-side request forgery (SSRF) vulnerability (CVE-2025-27090) has been identified in the Sliver C2 framework’s teamserver implementation, enabling attackers to establish unauthorized TC … Read more Published Date: Feb 25, 2025 (4 hours ago) Vulnerabilities has been mentioned in this article. CVE-2025-27090

CVE-2025-1676 – Hzmanyun Education and Training System PDF2SWF OS Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-1676 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 25, 2025 Action […]