CVE-2025-29834 – Microsoft Edge (Chromium-based) Out-of-bounds Read Code Execution
The following table lists the changes that have been made to the CVE-2025-29834 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 12, 2025 Action […]
CVE-2025-29803 – Microsoft SQL Server Management Studio Path Traversal Privilege Escalation
CVE ID : CVE-2025-29803 Published : April 12, 2025, 2:15 a.m. | 1 hour, 27 minutes ago Description : Uncontrolled search path element in Visual Studio Tools for Applications and SQL Server Management Studio allows an authorized attacker to elevate privileges locally. Severity: 7.3 | HIGH Visit the link for more details, such as CVSS details, affected […]
Critical Vulnerability in Everest Forms Plugin Threatens WordPress Sites
Critical Vulnerability in Everest Forms Plugin Threatens WordPress Sites A critical security vulnerability has been discovered in the Everest Forms WordPress plugin, putting over 100,000 websites at potential risk. The vulnerability, identified as CVE-2025-3439 (CVSS 9.8), … Read more Published Date: Apr 12, 2025 (1 hour, 13 minutes ago) Vulnerabilities has been mentioned in this article.
CVE-2025-2269 – 10Web Photo Gallery by 10Web Reflected Cross-Site Scripting
CVE ID : CVE-2025-2269 Published : April 12, 2025, 12:15 a.m. | 1 hour, 27 minutes ago Description : The Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘image_id’ parameter in all versions up to, and including, 1.8.34 due to insufficient input sanitization and output escaping. […]
CVE-2025-0129 – Prisma Access Browser: Cross-Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2025-0129 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 11, 2025 Action […]