CVE-2025-32697 – Wikimedia Foundation MediaWiki Permission Preservation Vulnerability
The following table lists the changes that have been made to the CVE-2025-32697 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by c4f26cc8-17ff-4c99-b5e2-38fc1793eacc Apr. 10, 2025 Action […]
CVE-2025-32696 – “MediaWiki Permission Preservation Vulnerability”
The following table lists the changes that have been made to the CVE-2025-32696 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by c4f26cc8-17ff-4c99-b5e2-38fc1793eacc Apr. 10, 2025 Action […]
CVE-2025-23010 – SonicWall NetExtender Windows Link Following Vulnerability
The following table lists the changes that have been made to the CVE-2025-23010 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 10, 2025 Action […]
CVE-2025-23009 – SonicWall NetExtender Windows Local File Deletion Vulnerability
The following table lists the changes that have been made to the CVE-2025-23009 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 10, 2025 Action […]
CVE-2025-23008 – SonicWall NetExtender Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-23008 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 10, 2025 Action […]
Hackers exploit WordPress plugin auth bypass hours after disclosure
Hackers exploit WordPress plugin auth bypass hours after disclosure Hackers started exploiting a high-severity flaw that allows bypassing authentication in the OttoKit (formerly SureTriggers) plugin for WordPress just hours after public disclosure. Users are strongly … Read more Published Date: Apr 10, 2025 (1 hour, 1 minute ago) Vulnerabilities has been mentioned in this article. CVE-2025-3102
CVE-2025-22232 – Spring Cloud Config Server Vault Token Token Persistence Vulnerability
The following table lists the changes that have been made to the CVE-2025-22232 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 10, 2025 Action […]
CVE-2025-24866 – Mattermost Access Control Bypass
The following table lists the changes that have been made to the CVE-2025-24866 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 10, 2025 Action […]
TCESB Malware Detailed out
TCESB Malware Detailed out TCESB malware represents a cutting-edge cyber-espionage tool designed for stealth and resilience, capable of bypassing endpoint detection systems and manipulating kernel-level structures. It has been … Read more Published Date: Apr 10, 2025 (2 hours, 38 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-11859
CVE-2025-32027 – Yii Reflected Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-32027 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 10, 2025 Action […]