CVE-2025-2986 – IBM Maximo Asset Management Stored Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-2986 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 25, 2025 Action […]
CVE-2025-3912 – WordPress WS Form LITE Unauthorized Data Access Vulnerability
The following table lists the changes that have been made to the CVE-2025-3912 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 25, 2025 Action […]
CVE-2025-2470 – Nextend Social Login WordPress Plugin Privilege Escalation Vulnerability
The Service Finder Bookings plugin for WordPress, used by the Service Finder – Directory and Job Board WordPress Theme, is vulnerable to privilege escalation in all versions up to, and including, 5.1. This is due to a lack of restriction on user role in the ‘nsl_registration_store_extra_input’ function. This makes it possible for unauthenticated attackers to […]
CVE-2024-11917 – Xing and Google Vulnerability: Authentication Bypass in JobSearch WP Job Board Plugin
The JobSearch WP Job Board plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.8.8. This is due to improper configurations in the ‘jobsearch_xing_response_data_callback’, ‘set_access_tokes’, and ‘google_callback’ functions. This makes it possible for unauthenticated attackers to log in as the first connected Xing user, or any connected Xing user […]
CVE-2025-34028 impacts Commvault Command Center
CVE-2025-34028 impacts Commvault Command Center CVE-2025-34028 is a critical path traversal vulnerability affecting the Commvault Command Center Innovation Release. This flaw allows unauthenticated remote attackers to upload malicious ZIP files, wh … Read more Published Date: Apr 25, 2025 (2 hours, 29 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-1021 CVE-2025-34028 CVE-2025-1732 CVE-2025-1731 CVE-2025-32433 CVE-2025-24054
Chrome Use-After-Free Vulnerabilities Exploited in the Wild
Chrome Use-After-Free Vulnerabilities Exploited in the Wild Google Chrome has faced a series of high-profile security incidents involving Use-After-Free (UAF) vulnerabilities, several of which have been actively exploited in the wild. These flaws, rooted in im … Read more Published Date: Apr 25, 2025 (2 hours, 32 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-2783 […]
Critical Commvault Flaw Rated 10/10: CSA Urges Immediate Patching
Critical Commvault Flaw Rated 10/10: CSA Urges Immediate Patching The Cyber Security Agency of Singapore (CSA) has warned users about a critical vulnerability affecting the Commvault Command Center. This Commvault vulnerability, identified as CVE-2025-34028, has bee … Read more Published Date: Apr 25, 2025 (1 hour, 50 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-34028 […]
SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers
SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers Vulnerability / Enterprise Security Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and code e … Read more Published Date: Apr 25, 2025 (1 hour, 58 minutes ago) Vulnerabilities has […]
CVE-2025-1565 – WordPress Mayosis Core Plugin Arbitrary File Read Vulnerability
The following table lists the changes that have been made to the CVE-2025-1565 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 25, 2025 Action […]
159 CVEs Exploited in The Wild in Q1 2025, 8.3% of Vulnerabilities Exploited Within 1-Day
159 CVEs Exploited in The Wild in Q1 2025, 8.3% of Vulnerabilities Exploited Within 1-Day In the first quarter of 2025, cybersecurity researchers documented an alarming surge in vulnerability exploitation, with 159 Common Vulnerabilities and Exposures (CVEs) being exploited in the wild. Th … Read more Published Date: Apr 25, 2025 (2 hours, 36 minutes ago) Vulnerabilities […]