CVE-2025-2511 – WordPress AHAthat Plugin SQL Injection Vulnerability

CVE ID : CVE-2025-2511 Published : March 19, 2025, 12:15 p.m. | 1 hour, 9 minutes ago Description : The AHAthat Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation […]

CVE-2024-12920 – FoodBakery | Delivery Restaurant Directory WordPress Theme Unauthenticated Data Access and Modification Vulnerability

CVE ID : CVE-2024-12920 Published : March 19, 2025, 12:15 p.m. | 1 hour, 9 minutes ago Description : The FoodBakery | Delivery Restaurant Directory WordPress Theme theme for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and […]

CVE-2025-27018 – Apache Airflow MySQL Provider SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-27018 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 19, 2025 Action […]

CVE-2024-12137 – Elfatek Elektronics ANKA JPD-00028 Authentication Bypass

The following table lists the changes that have been made to the CVE-2024-12137 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 19, 2025 Action […]

CVE-2024-13790 – MinimogWP Local File Inclusion Vulnerability

The MinimogWP – The High Converting eCommerce WordPress Theme theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.7.0 via the ‘template’ parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those […]

CVE-2024-12136 – Elfatek Elektronics ANKA JPD-00028 Authentication Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2024-12136 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 19, 2025 Action […]

CVE-2024-13412 – CozyStay WordPress Unauthenticated Remote Code Execution

The following table lists the changes that have been made to the CVE-2024-13412 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 19, 2025 Action […]

CVE-2024-13410 – CozyStay WordPress PHP Object Injection Vulnerability

The CozyStay and TinySalt plugins for WordPress are vulnerable to PHP Object Injection in all versions up to, and including, 1.7.0, and in all versions up to, and including 3.9.0, respectively, via deserialization of untrusted input in the ‘ajax_handler’ function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP […]

CVE-2025-30236 – Shearwater SecurEnvoy SecurAccess TOTP Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-30236 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by [email protected] Mar. 19, 2025 Action Type […]