CVE-2025-32585 – Trusty Plugins Shop Products Filter Path Traversal PHP Local File Inclusion Vulnerability

The following table lists the changes that have been made to the CVE-2025-32585 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 11, 2025 Action […]

CVE-2025-32568 – EmpikPlace for Woocommerce Deserialization of Untrusted Data Object Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-32568 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 11, 2025 Action […]

CVE-2025-32567 – Easy Post Duplicator SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-32567 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 11, 2025 Action […]

CVE-2025-32565 – Vertim Neon Product Designer SQL Injection

The following table lists the changes that have been made to the CVE-2025-32565 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 11, 2025 Action […]

CVE-2025-32558 – Apache Duplicate Title Checker SQL Injection

The following table lists the changes that have been made to the CVE-2025-32558 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 11, 2025 Action […]

CVE-2025-32542 – EazyPlugins Eazy Plugin Manager Missing Authorization Vulnerability

The following table lists the changes that have been made to the CVE-2025-32542 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 11, 2025 Action […]

AMD CPU Signature Verification Vulnerability Let Attackers Load Malicious Microcode

AMD CPU Signature Verification Vulnerability Let Attackers Load Malicious Microcode AMD has disclosed a significant security vulnerability that could allow attackers with administrative privileges to load unauthorized microcode patches into the company’s processors. Identified as CVE … Read more Published Date: Apr 11, 2025 (2 hours, 19 minutes ago) Vulnerabilities has been mentioned in this article.

Jenkins Docker Images Vulnerability Let Attackers Insert Themselves in Network Path

Jenkins Docker Images Vulnerability Let Attackers Insert Themselves in Network Path A critical security flaw in widely used Jenkins Docker images has been discovered, potentially compromising build pipelines across thousands of organizations. The vulnerability, disclosed in a Jenkins … Read more Published Date: Apr 11, 2025 (2 hours, 22 minutes ago) Vulnerabilities has been mentioned in this […]

Ivanti 0-day RCE Vulnerability Exploitation Details Disclosed

Ivanti 0-day RCE Vulnerability Exploitation Details Disclosed A detailed technical analysis has been published regarding CVE-2025-22457, an unauthenticated remote code execution (RCE) vulnerability impacting several Ivanti products. The vulnerability was recentl … Read more Published Date: Apr 11, 2025 (2 hours, 24 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-22457

100,000+ WordPress Sites at Risk as SureTriggers Exploit Goes Live

100,000+ WordPress Sites at Risk as SureTriggers Exploit Goes Live A recently uncovered SureTriggers vulnerability has put more than 100,000 websites at risk, highlighting once again how critical plugin security is for WordPress site administrators. The vulnerability … Read more Published Date: Apr 11, 2025 (3 hours, 38 minutes ago) Vulnerabilities has been mentioned in this article. […]