CVE-2025-1757 – WordPress Portfolio Builder – Portfolio Gallery Stored Cross-Site Scripting Vulnerability
CVE ID : CVE-2025-1757 Published : Feb. 28, 2025, 5:15 a.m. | 37 minutes ago Description : The WordPress Portfolio Builder – Portfolio Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘pfhub_portfolio’ and ‘pfhub_portfolio_portfolio’ shortcodes in all versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping […]
CVE-2025-1505 – WordPress Advanced AJAX Product Filters Reflected Cross-Site Scripting
CVE ID : CVE-2025-1505 Published : Feb. 28, 2025, 5:15 a.m. | 37 minutes ago Description : The Advanced AJAX Product Filters plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘nonce’ parameter in all versions up to, and including, 1.6.8.1 due to insufficient input sanitization and output escaping. This makes it possible for […]
CVE-2025-0801 – RateMyAgent WordPress CSRF
CVE ID : CVE-2025-0801 Published : Feb. 28, 2025, 5:15 a.m. | 37 minutes ago Description : The RateMyAgent Official plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.0. This is due to missing or incorrect nonce validation on the ‘rma-settings-wizard’. This makes it possible for unauthenticated attackers […]
CVE-2024-13796 – ComboBlocks WordPress Sensitive Information Exposure
CVE ID : CVE-2024-13796 Published : Feb. 28, 2025, 5:15 a.m. | 37 minutes ago Description : The Post Grid and Gutenberg Blocks – ComboBlocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.3.6 via the /wp-json/post-grid/v2/get_users REST API This makes it possible for unauthenticated attackers to extract […]
CVE-2025-1744 – Radareorg Radare2 Heap-Based Buffer Overflow
The following table lists the changes that have been made to the CVE-2025-1744 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 28, 2025 Action […]
Targeted by Ransomware, Middle East Banks Shore Up Security
Targeted by Ransomware, Middle East Banks Shore Up Security Source: VideoFlow via ShutterstockBanks and financial services firms across the Middle East weathered simulated attacks at the fourth annual Cyber Wargaming exercise in the United Arab Emirates last w … Read more Published Date: Feb 28, 2025 (1 hour, 52 minutes ago) Vulnerabilities has been mentioned in this […]
Mac Users Rejoice! Microsoft’s Copilot App Lands on the Mac App Store
Mac Users Rejoice! Microsoft’s Copilot App Lands on the Mac App Store Microsoft has recently introduced its Copilot app to the Mac App Store, allowing Mac users to seamlessly access Copilot’s AI services in a native and fully compatible format.Previously, Mac users coul … Read more Published Date: Feb 28, 2025 (1 hour, 55 minutes ago) Vulnerabilities […]
CVE-2025-23225 – IBM MQ Denial of Service Vulnerability
The following table lists the changes that have been made to the CVE-2025-23225 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 28, 2025 Action […]
CVE-2025-0975 – IBM MQ Code Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-0975 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 28, 2025 Action […]
CVE-2025-0823 – IBM Cognos Analytics Directory Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-0823 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 28, 2025 Action […]