Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act
Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act Jul 16, 2025Ravie LakshmananAI Security / Vulnerability Google on Tuesday revealed that its large language model (LLM)-assisted vulnerability discovery framework discovered a security flaw in the SQ … Read more Published Date: Jul 16, 2025 (3 hours, 17 minutes ago) Vulnerabilities has been mentioned […]
CVE-2025-6747 – Avada Fusion Builder Stored Cross-Site Scripting Vulnerability
CVE ID : CVE-2025-6747 Published : July 16, 2025, 7:15 a.m. | 2 hours ago Description : The Avada (Fusion) Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘fusion_map’ shortcode in all versions up to, and including, 3.12.1 due to insufficient input sanitization and output escaping on user supplied attributes. This […]
CVE-2025-5845 – WordPress Affiliate Reviews Stored Cross-Site Scripting Vulnerability
CVE ID : CVE-2025-5845 Published : July 16, 2025, 7:15 a.m. | 2 hours ago Description : The Affiliate Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘numColumns’ parameter in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, […]
CVE-2025-5843 – Brandfolder WordPress Stored Cross-Site Scripting Vulnerability
CVE ID : CVE-2025-5843 Published : July 16, 2025, 7:15 a.m. | 2 hours ago Description : The Brandfolder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 5.0.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with […]
CVE-2025-7673 – Zyxel zhttpd Web Server Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-7673 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 16, 2025 Action […]
CVE-2025-7359 – WooCommerce Counter Live Visitors File Deletion Arbitrary Directory Vulnerability
The following table lists the changes that have been made to the CVE-2025-7359 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 16, 2025 Action […]
CVE-2025-6043 – WordPress Malware Removal Plugin File Deletion Arbitrary File Deletion Vulnerability
The following table lists the changes that have been made to the CVE-2025-6043 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 16, 2025 Action […]
CVE-2025-52690 – Cisco Wireless Access Point Remote Command Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-52690 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 5f57b9bf-260d-4433-bf07-b6a79e9bb7d4 Jul. 16, 2025 Action […]
CVE-2025-52689 – Cisco Wireless Access Point Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-52689 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 5f57b9bf-260d-4433-bf07-b6a79e9bb7d4 Jul. 16, 2025 Action […]
CVE-2025-52688 – Aruba Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-52688 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 5f57b9bf-260d-4433-bf07-b6a79e9bb7d4 Jul. 16, 2025 Action […]