GitLab Vulnerabilities Let Attackers Bypass Security Controls & Execute Arbitrary Code

GitLab Vulnerabilities Let Attackers Bypass Security Controls & Execute Arbitrary Code GitLab has issued a security advisory warning of multiple high-risk vulnerabilities in its DevOps platform, including two critical Cross-Site Scripting (XSS) flaws enabling attackers to bypass securit … Read more Published Date: Feb 27, 2025 (3 hours, 27 minutes ago) Vulnerabilities has been mentioned in this […]

CVE-2024-13907 – BoldGrid WordPress Backup Plugin SSRF Vulnerability

CVE ID : CVE-2024-13907 Published : Feb. 27, 2025, 7:15 a.m. | 1 hour, 45 minutes ago Description : The Total Upkeep – WordPress Backup Plugin plus Restore & Migrate by BoldGrid plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.16.8 via the ‘download’ function. This makes it possible […]

CVE-2024-0392 – WSO2 Enterprise Integrator CSRF Vulnerability

The following table lists the changes that have been made to the CVE-2024-0392 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by ed10eef1-636d-4fbe-9993-6890dfa878f8 Feb. 27, 2025 Action […]

CVE-2025–1094: PostgreSQL Injection Vulnerability Exploit

CVE-2025–1094: PostgreSQL Injection Vulnerability Exploit OverviewCVE-2025–1094 is a high-severity SQL injection vulnerability affecting multiple versions of PostgreSQL. This flaw is caused by improper neutralization of quoting syntax within PostgreSQL’s esc … Read more Published Date: Feb 27, 2025 (1 hour, 55 minutes ago) Vulnerabilities has been mentioned in this article.

LibreOffice Vulnerabilities Let Attackers Execute Malicious Files on Windows Systems

LibreOffice Vulnerabilities Let Attackers Execute Malicious Files on Windows Systems A critical security vulnerability in LibreOffice (CVE-2025-0514) has been patched after researchers discovered that manipulated documents could bypass safeguards and execute malicious files on Windows … Read more Published Date: Feb 27, 2025 (2 hours, 16 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-0514 CVE-2018-6871

CVE-2025-1295 – Elementor Helper Core WordPress Privilege Escalation Vulnerability

CVE ID : CVE-2025-1295 Published : Feb. 27, 2025, 6:15 a.m. | 38 minutes ago Description : The Templines Elementor Helper Core plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.7. This is due to allowing arbitrary user meta updates. This makes it possible for authenticated attackers, with Subscriber-level […]

CVE-2024-2297 – Bricks WordPress Privilege Escalation Vulnerability

CVE ID : CVE-2024-2297 Published : Feb. 27, 2025, 6:15 a.m. | 38 minutes ago Description : The Bricks theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.9.6.1. This is due to insufficient validation checks placed on the create_autosave AJAX function. This makes it possible for authenticated attackers, with […]

CVE-2025-1686 – Apache Pebble Templates File Inclusion Vulnerability

The following table lists the changes that have been made to the CVE-2025-1686 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 27, 2025 Action […]