CVE-2023-37930 – Fortinet FortiOS and FortiProxy Uninitialized Resource and Excessive Iteration Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2023-37930 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2024-26013 – “Fortinet FortiOS and Related Products FGFM Authentication Request Impersonation Vulnerability”

A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15 and before 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9 and before 7.0.15, Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 […]

WhatsApp-spoofinglek kan tot uitvoeren van willekeurige code leiden

WhatsApp-spoofinglek kan tot uitvoeren van willekeurige code leiden Een kwetsbaarheid in WhatsApp voor Windows kan tot het uitvoeren van willekeurige code leiden, zo waarschuwt de chatapplicatie. Het probleem is verholpen in versie 2.2450.6 en is in alle versies daarv … Read more Published Date: Apr 08, 2025 (1 hour, 5 minutes ago) Vulnerabilities has been mentioned in […]

CVE-2025-2876 – MelaPress WordPress Unauthenticated User Deletion Vulnerability

The following table lists the changes that have been made to the CVE-2025-2876 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-2568 – WordPress WooCommerce Vayu Blocks Unauthenticated Data Access and Modification

The following table lists the changes that have been made to the CVE-2025-2568 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

Nissan Leaf Vulnerability Exploited to Gain Control Over the Car Remotely

Nissan Leaf Vulnerability Exploited to Gain Control Over the Car Remotely A team of researchers at PCAutomotive revealed to Cyber security news today that attackers could fully compromise second-generation Nissan Leaf EVs (2020 model) through a flaw in the infotainment syst … Read more Published Date: Apr 08, 2025 (2 hours, 55 minutes ago) Vulnerabilities has been […]

CVE-2025-30166 – Pimcore Admin Classic Bundle HTML Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-30166 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-29986 – Dell Common Event Enabler CEE Improper Restriction of Communication Channel to Intended Endpoints

The following table lists the changes that have been made to the CVE-2025-29986 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-29985 – Dell CEE Common Anti-Virus Agent (CAVA) Initialization of Resource with Insecure Default Unauthorized Access Vulnerability

The following table lists the changes that have been made to the CVE-2025-29985 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CISA Warns of CrushFTP Exploit Letting Attackers Bypass Authentication

CISA Warns of CrushFTP Exploit Letting Attackers Bypass Authentication The Cybersecurity and Infrastructure Security Agency (CISA) has recently added a new vulnerability to its Known Exploited Vulnerabilities Catalog. The vulnerability, identified as CVE-2025-31161, is a … Read more Published Date: Apr 08, 2025 (1 hour, 8 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-31161 CVE-2025-22457 […]