CVE-2025-20164 – “Cisco Industrial Ethernet Switch Device Manager Privilege Elevation Vulnerability”

The following table lists the changes that have been made to the CVE-2025-20164 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 07, 2025 Action […]

CVE-2025-20162 – “Cisco DHCP Snooping Denial of Service Vulnerability”

The following table lists the changes that have been made to the CVE-2025-20162 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 07, 2025 Action […]

CVE-2025-20154 – Cisco TWAMP Server Out-of-Bounds Array Access Denial of Service Vulnerability

A vulnerability in the Two-Way Active Measurement Protocol (TWAMP) server feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. For Cisco IOS XR Software, this vulnerability could cause the ipsla_ippm_server process to reload unexpectedly […]

CVE-2025-46551 – JRuby-OpenSSL SSL Hostname Verification Bypass

JRuby-OpenSSL is an add-on gem for JRuby that emulates the Ruby OpenSSL native library. Starting in JRuby-OpenSSL version 0.12.1 and prior to version 0.15.4 (corresponding to JRuby versions starting in 9.3.4.0 prior to 9.4.12.1 and 10.0.0.0 prior to 10.0.0.1), when verifying SSL certificates, JRuby-OpenSSL does not verify that the hostname presented in the certificate matches […]

CVE-2025-46827 – Graylog HTML Form Cookie Disclosure

Graylog is a free and open log management platform. Prior to versions 6.0.14, 6.1.10, and 6.2.0, it is possible to obtain user session cookies by submitting an HTML form as part of an Event Definition Remediation Step field. For this attack to succeed, the attacker needs a user account with permissions to create event definitions, […]

CVE-2024-47619 – Syslog-ng TLS Wildcard Certificate Matching Vulnerability

The following table lists the changes that have been made to the CVE-2024-47619 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 07, 2025 Action […]

Hackers exploit OttoKit WordPress plugin flaw to add admin accounts

Hackers exploit OttoKit WordPress plugin flaw to add admin accounts Hackers are exploiting a critical unauthenticated privilege escalation vulnerability in the OttoKit WordPress plugin to create rogue admin accounts on targeted sites. OttoKit (formerly SureTriggers) i … Read more Published Date: May 07, 2025 (3 hours, 8 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-27007 […]

CVE-2025-47692 – ContentStudio Missing Authorization Vulnerability

The following table lists the changes that have been made to the CVE-2025-47692 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 07, 2025 Action […]

CVE-2025-47688 – Saad Iqbal Advanced File Manager Missing Authorization Vulnerability

The following table lists the changes that have been made to the CVE-2025-47688 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 07, 2025 Action […]

CVE-2025-47686 – DELUCKS SEO Cross-site Scripting

The following table lists the changes that have been made to the CVE-2025-47686 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 07, 2025 Action […]