ASUS Urges Windows 11 Upgrade: The Dawn of AI-Powered PCs and the End of Windows 10

ASUS Urges Windows 11 Upgrade: The Dawn of AI-Powered PCs and the End of Windows 10 Last month, hardware manufacturer ASUS published an article exploring the necessity of upgrading to Windows 11, as Microsoft will officially end support for Windows 10 on October 14. After this date, … Read more Published Date: Jun 03, 2025 […]

CVE-2025-46355 – PC Time Tracer Elevation of Privilege Vulnerability

The following table lists the changes that have been made to the CVE-2025-46355 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

CVE-2025-41428 – TimeWorks Path Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2025-41428 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely

Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely Multiple security vulnerabilities in Hewlett-Packard Enterprise (HPE) StoreOnce software platform that could allow remote attackers to execute malicious code, bypass authentication mechanisms, and acc … Read more Published Date: Jun 03, 2025 (2 hours, 33 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-37096 CVE-2025-37095 CVE-2025-37094 […]

CVE-2025-21479 – NVIDIA GPU Unauthenticated Command Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-21479 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]

Google dicht actief misbruikt V8-beveiligingslek in Chrome

Google dicht actief misbruikt V8-beveiligingslek in Chrome Google heeft een actief aangevallen beveiligingslek in Chrome gedicht. De kwetsbaarheid bevond zich in V8, de JavaScript-engine die Chrome en andere browsers gebruiken voor het uitvoeren van JavaScrip … Read more Published Date: Jun 03, 2025 (2 hours, 48 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-5419

CVE-2025-3662 – FancyBox for WordPress Unauthenticated Stored XSS

CVE ID : CVE-2025-3662 Published : June 3, 2025, 6:15 a.m. | 1 hour, 56 minutes ago Description : The FancyBox for WordPress plugin before 3.3.6 does not escape captions and titles attributes before using them to populate galleries’ caption fields. The issue was received as a Contributor+ Stored XSS, however one of our researcher (Marc Montpas) […]

CVE-2025-3584 – WordPress Newsletter Stored Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-3584 Published : June 3, 2025, 6:15 a.m. | 1 hour, 56 minutes ago Description : The Newsletter WordPress plugin before 8.8.2 does not sanitise and escape some of its Subscription settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed […]

CVE-2025-4567 – WordPress Post Slider Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-4567 Published : June 3, 2025, 6:15 a.m. | 1 hour, 56 minutes ago Description : The Post Slider and Post Carousel with Post Vertical Scrolling Widget WordPress plugin before 3.2.10 does not validate and escape some of its Widget options before outputting them back in a page/post where the block is embed, which […]

CVE-2025-31712 – Cisco cplog Out-of-Bounds Write Vulnerability

The following table lists the changes that have been made to the CVE-2025-31712 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 03, 2025 Action […]