CVE-2025-46512 – Shamim Hasan Custom Functions Plugin CSRF Stored XSS
The following table lists the changes that have been made to the CVE-2025-46512 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 24, 2025 Action […]
CVE-2025-46511 – Derek Springer BeerXML Shortcode SSRF Vulnerability
The following table lists the changes that have been made to the CVE-2025-46511 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 24, 2025 Action […]
CVE-2025-46264 – Angelo Mandato PowerPress Podcasting Unrestricted File Upload Vulnerability
The following table lists the changes that have been made to the CVE-2025-46264 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 24, 2025 Action […]
CVE-2025-46248 – M A Vinoth Kumar Frontend Dashboard SQL Injection
The following table lists the changes that have been made to the CVE-2025-46248 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 24, 2025 Action […]
CVE-2025-39377 – Appsero Helper SQL Injection
The following table lists the changes that have been made to the CVE-2025-39377 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 24, 2025 Action […]
New Stego Campaign Leverages MS Office Vulnerability to Deliver AsyncRAT
New Stego Campaign Leverages MS Office Vulnerability to Deliver AsyncRAT Cybersecurity researchers have discovered a sophisticated malware campaign that employs steganography techniques to hide malicious code within seemingly innocent image files. This attack chain leverag … Read more Published Date: Apr 24, 2025 (2 hours ago) Vulnerabilities has been mentioned in this article. CVE-2017-0199
CVE-2025-43855 – Apache tRPC WebSocket Server Crash Vulnerability (Denial of Service)
The following table lists the changes that have been made to the CVE-2025-43855 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 24, 2025 Action […]
CVE-2025-30409 – Acronis Cyber Protect Cloud Agent Denial of Service
The following table lists the changes that have been made to the CVE-2025-30409 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 24, 2025 Action […]
CVE-2025-30408 – Acronis Cyber Protect Cloud Agent Windows Privilege Escalation
The following table lists the changes that have been made to the CVE-2025-30408 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 24, 2025 Action […]
NVIDIA NeMo Framework Vulnerability Let Attackers Execute Remote Code
NVIDIA NeMo Framework Vulnerability Let Attackers Execute Remote Code There are three high-severity vulnerabilities in the NVIDIA NeMo Framework that could allow attackers to execute remote code, potentially compromising AI systems and leading to data tampering. The sec … Read more Published Date: Apr 24, 2025 (3 hours, 5 minutes ago) Vulnerabilities has been mentioned in this […]