CVE-2025-1757 – WordPress Portfolio Builder – Portfolio Gallery Stored Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-1757 Published : Feb. 28, 2025, 5:15 a.m. | 37 minutes ago Description : The WordPress Portfolio Builder – Portfolio Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘pfhub_portfolio’ and ‘pfhub_portfolio_portfolio’ shortcodes in all versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping […]

CVE-2025-1505 – WordPress Advanced AJAX Product Filters Reflected Cross-Site Scripting

CVE ID : CVE-2025-1505 Published : Feb. 28, 2025, 5:15 a.m. | 37 minutes ago Description : The Advanced AJAX Product Filters plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘nonce’ parameter in all versions up to, and including, 1.6.8.1 due to insufficient input sanitization and output escaping. This makes it possible for […]

CVE-2025-0801 – RateMyAgent WordPress CSRF

CVE ID : CVE-2025-0801 Published : Feb. 28, 2025, 5:15 a.m. | 37 minutes ago Description : The RateMyAgent Official plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.0. This is due to missing or incorrect nonce validation on the ‘rma-settings-wizard’. This makes it possible for unauthenticated attackers […]

CVE-2024-13796 – ComboBlocks WordPress Sensitive Information Exposure

CVE ID : CVE-2024-13796 Published : Feb. 28, 2025, 5:15 a.m. | 37 minutes ago Description : The Post Grid and Gutenberg Blocks – ComboBlocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.3.6 via the /wp-json/post-grid/v2/get_users REST API This makes it possible for unauthenticated attackers to extract […]

CVE-2025-1744 – Radareorg Radare2 Heap-Based Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-1744 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 28, 2025 Action […]

Targeted by Ransomware, Middle East Banks Shore Up Security

Targeted by Ransomware, Middle East Banks Shore Up Security Source: VideoFlow via ShutterstockBanks and financial services firms across the Middle East weathered simulated attacks at the fourth annual Cyber Wargaming exercise in the United Arab Emirates last w … Read more Published Date: Feb 28, 2025 (1 hour, 52 minutes ago) Vulnerabilities has been mentioned in this […]

Mac Users Rejoice! Microsoft’s Copilot App Lands on the Mac App Store

Mac Users Rejoice! Microsoft’s Copilot App Lands on the Mac App Store Microsoft has recently introduced its Copilot app to the Mac App Store, allowing Mac users to seamlessly access Copilot’s AI services in a native and fully compatible format.Previously, Mac users coul … Read more Published Date: Feb 28, 2025 (1 hour, 55 minutes ago) Vulnerabilities […]

CVE-2025-23225 – IBM MQ Denial of Service Vulnerability

The following table lists the changes that have been made to the CVE-2025-23225 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 28, 2025 Action […]

CVE-2025-0975 – IBM MQ Code Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-0975 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 28, 2025 Action […]

CVE-2025-0823 – IBM Cognos Analytics Directory Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2025-0823 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 28, 2025 Action […]