Google Patched Android 0-Day Vulnerability Exploited in the Wild

Google Patched Android 0-Day Vulnerability Exploited in the Wild Google has released its April 2025 Android Security Bulletin, addressing numerous critical vulnerabilities including two zero-day flaws actively exploited in targeted attacks. This marks the third con … Read more Published Date: Apr 08, 2025 (1 hour, 46 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-53197 […]

CVE-2025-2883 – SagePay Payments Using Contact Form 7 WordPress Sensitive Information Exposure

The following table lists the changes that have been made to the CVE-2025-2883 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-3437 – Motors Car Dealership & Classified Listings Plugin WordPress Authorization Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-3437 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-2808 – Motors Car Dealership & Classified Listings Plugin Stored Cross-Site Scripting

The following table lists the changes that have been made to the CVE-2025-2808 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-2807 – Motor’s Car Dealership & Classified Listings Plugin Unauthenticated Plugin Installation Vulnerability

The following table lists the changes that have been made to the CVE-2025-2807 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 08, 2025 Action […]

CVE-2025-3433 – WordPress Advanced Advertising System Open Redirect Vulnerability

CVE ID : CVE-2025-3433 Published : April 8, 2025, 9:15 a.m. | 57 minutes ago Description : The Advanced Advertising System plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 1.3.1. This is due to insufficient validation on the redirect url supplied via the ‘redir’ parameter. This makes it possible […]

CVE-2025-3432 – WordPress AAWP Obfuscator Stored Cross-Site Scripting

CVE ID : CVE-2025-3432 Published : April 8, 2025, 9:15 a.m. | 57 minutes ago Description : The AAWP Obfuscator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-aawp-web’ parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, […]

CVE-2025-3064 – WPFront User Role Editor CSRF Vulnerability

CVE ID : CVE-2025-3064 Published : April 8, 2025, 9:15 a.m. | 57 minutes ago Description : The WPFront User Role Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.2.1. This is due to missing or incorrect nonce validation on the whitelist_options() function. This makes it possible […]

CVE-2025-30280 – Mendix Entity Enumeration Vulnerability

A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.21.0), Mendix Runtime V10.12 (All versions), Mendix Runtime V10.18 (All versions), Mendix Runtime V10.6 (All versions), Mendix Runtime V8 (All versions), Mendix Runtime V9 (All versions < V9.24.34). Affected applications allow for entity enumeration due to distinguishable responses in certain client actions. This […]