CVE-2025-3503 – “WP Maps Stored Cross-Site Scripting Vulnerability”
CVE ID : CVE-2025-3503 Published : May 1, 2025, 6:15 a.m. | 27 minutes ago Description : The WP Maps WordPress plugin before 4.7.2 does not sanitise and escape some of its Map settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed […]
CVE-2025-3502 – WP Maps Stored Cross-Site Scripting Vulnerability
CVE ID : CVE-2025-3502 Published : May 1, 2025, 6:15 a.m. | 27 minutes ago Description : The WP Maps WordPress plugin before 4.7.2 does not sanitise and escape some of its Map settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed […]
CVE-2024-13381 – WordPress Calculated Fields Form Stored Cross-Site Scripting Vulnerability
CVE ID : CVE-2024-13381 Published : May 1, 2025, 6:15 a.m. | 27 minutes ago Description : The Calculated Fields Form WordPress plugin before 5.2.62 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed […]
SonicWall OS Command Injection Vulnerability Exploited in the Wild
SonicWall OS Command Injection Vulnerability Exploited in the Wild SonicWall has issued an urgent warning to customers that threat actors are actively exploiting a high-severity command injection vulnerability in its Secure Mobile Access (SMA) appliances. The vulnera … Read more Published Date: May 01, 2025 (2 hours, 23 minutes ago) Vulnerabilities has been mentioned in this article. […]
CVE-2025-4150 – Netgear EX6200 Remote Buffer Overflow
The following table lists the changes that have been made to the CVE-2025-4150 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 01, 2025 Action […]
CVE-2025-3952 – Projectopia WordPress Project Management Unauthenticated Option Deletion
CVE ID : CVE-2025-3952 Published : May 1, 2025, 5:15 a.m. | 21 minutes ago Description : The Projectopia – WordPress Project Management plugin for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the ‘pto_remove_logo’ function in all versions up to, […]
CVE-2025-4099 – WordPress List Children Plugin Stored Cross-Site Scripting Vulnerability
CVE ID : CVE-2025-4099 Published : May 1, 2025, 5:15 a.m. | 21 minutes ago Description : The List Children plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘list_children’ shortcode in all versions up to, and including, 2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes […]
CVE-2024-13845 – WordPress Gravity Forms WebHooks SSRF
CVE ID : CVE-2024-13845 Published : May 1, 2025, 5:15 a.m. | 21 minutes ago Description : The Gravity Forms WebHooks plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.6.0 via the ‘process_feed’ method of the GF_Webhooks class This makes it possible for authenticated attackers, with Administrator-level access […]
CVE-2025-4149 – Netgear EX6200 Remote Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-4149 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 01, 2025 Action […]
CVE-2025-4148 – Netgear EX6200 Remote Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-4148 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 01, 2025 Action […]