CVE-2025-4433 – Devolutions Server Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-4433 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 May. 30, 2025 Action Type […]

CVE-2025-40909 – “Perl threads Directory Handle Race Condition Vulnerability”

The following table lists the changes that have been made to the CVE-2025-40909 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 May. 30, 2025 Action Type […]

CVE-2025-2500 – Oracle Asset Suite SOAP Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-2500 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]

CVE-2025-1484 – Adobe Asset Suite Cross-Site Scripting

The following table lists the changes that have been made to the CVE-2025-1484 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 30, 2025 Action […]

The Good, the Bad and the Ugly in Cybersecurity – Week 22

The Good, the Bad and the Ugly in Cybersecurity – Week 22 The Good | Robbinhood Ransomware Operator Pleads Guilty & Cyber Scam Firm Sanctioned U.S. authorities have taken actions against Robbinhood ransomware and Funnull Technology, two high-impact cybercrim … Read more Published Date: May 30, 2025 (4 hours, 20 minutes ago) Vulnerabilities has been mentioned in […]

CVE-2025-4597 – Woo Slider Pro WordPress Unauthorized Data Modification Vulnerability

CVE ID : CVE-2025-4597 Published : May 30, 2025, 12:15 p.m. | 1 hour, 24 minutes ago Description : The Woo Slider Pro – Drag Drop Slider Builder For WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the woo_slide_pro_delete_draft_preview AJAX action in all versions up to, and […]

CVE-2025-5190 – WordPress Browse As Plugin Authentication Bypass Vulnerability

The Browse As plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.2. This is due to incorrect authentication checking in the ‘IS_BA_Browse_As::notice’ function with the ‘is_ba_original_user_COOKIEHASH’ cookie value. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the […]

Exploits and vulnerabilities in Q1 2025

Exploits and vulnerabilities in Q1 2025 The first quarter of 2025 saw the continued publication of vulnerabilities discovered and fixed in 2024, as some researchers were previously unable to disclose the details. This partially shifted the … Read more Published Date: May 30, 2025 (1 hour, 14 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-24071 […]

New Apache InLong Vulnerability (CVE-2025-27522) Exposes Systems to Remote Code Execution Risks

New Apache InLong Vulnerability (CVE-2025-27522) Exposes Systems to Remote Code Execution Risks A newly disclosed vulnerability, tracked as CVE-2025-27522, has been discovered in Apache InLong, a widely used real-time data streaming platform. The Apache InLong vulnerability introduces the potent … Read more Published Date: May 30, 2025 (1 hour, 40 minutes ago) Vulnerabilities has been mentioned in […]