CVE-2025-25060 – AssetView Unauthenticated File Access and Deletion Vulnerability
The following table lists the changes that have been made to the CVE-2025-25060 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]
CVE-2025-2779 – WordPress HT Script Plugin Unauthenticated Data Modification Vulnerability
The Insert Headers and Footers Code – HT Script plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_dismiss function in all versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 1/true […]
CISA Flags Apache Tomcat CVE-2025-24813 as Actively Exploited with 9.8 CVSS
CISA Flags Apache Tomcat CVE-2025-24813 as Actively Exploited with 9.8 CVSS A critical vulnerability in Apache Tomcat, now actively exploited in the wild, has landed in the CISA Known Exploited Vulnerabilities Catalog with a top-tier CVSS score of 9.8. Identified as CVE-2025- … Read more Published Date: Apr 02, 2025 (1 hour, 51 minutes ago) Vulnerabilities has […]
Chrome 135: 14 Security Fixes, High-Severity CVE-2025-3066 Flaw Patched
Chrome 135: 14 Security Fixes, High-Severity CVE-2025-3066 Flaw Patched Google’s Chrome team has officially rolled out Chrome 135 to the Stable Channel for Windows, macOS, and Linux, bringing a wave of security enhancements, bug fixes, and under-the-hood improvements to b … Read more Published Date: Apr 02, 2025 (2 hours, 10 minutes ago) Vulnerabilities has been mentioned […]
CVE-2025-3074 – Google Chrome UI Spoofing Vulnerability
The following table lists the changes that have been made to the CVE-2025-3074 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]
CVE-2025-3072 – Google Chrome Custom Tabs UI Spoofing Vulnerability
The following table lists the changes that have been made to the CVE-2025-3072 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]
CVE-2025-3071 – Google Chrome Navigation Same-Origin Policy Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-3071 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]
CVE-2025-3070 – Google Chrome Extension Input Validation Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-3070 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]
CVE-2025-3068 – Google Chrome Android Intents Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-3068 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]
CVE-2025-3069 – Google Chrome Extension Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-3069 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]