CVE-2025-1785 – WordPress Download Manager Directory Traversal
The Download Manager plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.3.08 via the ‘wpdm_newfile’ action. This makes it possible for authenticated attackers, with Author-level access and above, to overwrite select file types outside of the originally intended directory, which may cause a denial of service.
CVE-2025-2271 – “Issuetrak Unrestricted Audit Data Exposure”
A vulnerability exists in Issuetrak v17.2.2 and prior that allows a low-privileged user to access audit results of other users by exploiting an Insecure Direct Object Reference (IDOR) vulnerability in the Issuetrak audit component. The vulnerability enables unauthorized access to sensitive information, including user details, network and hardware information, installed programs, running processes, drives, and […]
CVE-2025-1119 – WordPress Simply Schedule Appointments Booking Plugin Cross-Site Scripting (XSS)
CVE ID : CVE-2025-1119 Published : March 13, 2025, 7:15 a.m. | 30 minutes ago Description : The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.6.8.5. This is due to the software allowing users to execute an action […]
CVE-2025-1487 – “WoWPth WordPress Plugin Reflected Cross-Site Scripting Vulnerability”
The following table lists the changes that have been made to the CVE-2025-1487 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1486 – “WordPress WoWPth Plugin Reflected Cross-Site Scripting Vulnerability”
The following table lists the changes that have been made to the CVE-2025-1486 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1436 – Limit Bio WordPress Stored Cross-Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2025-1436 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1401 – WordPress Click Info Reflected Cross-Site Scripting
The following table lists the changes that have been made to the CVE-2025-1401 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1257 – GitLab API Denial of Service Vulnerability
The following table lists the changes that have been made to the CVE-2025-1257 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-0652 – “GitLab Information Disclosure Vulnerability”
The following table lists the changes that have been made to the CVE-2025-0652 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-8402 – GitLab EE Input Validation Vulnerability in Google Cloud IAM Integration
The following table lists the changes that have been made to the CVE-2024-8402 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.