Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act

Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act Jul 16, 2025Ravie LakshmananAI Security / Vulnerability Google on Tuesday revealed that its large language model (LLM)-assisted vulnerability discovery framework discovered a security flaw in the SQ … Read more Published Date: Jul 16, 2025 (3 hours, 17 minutes ago) Vulnerabilities has been mentioned […]

CVE-2025-6747 – Avada Fusion Builder Stored Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-6747 Published : July 16, 2025, 7:15 a.m. | 2 hours ago Description : The Avada (Fusion) Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘fusion_map’ shortcode in all versions up to, and including, 3.12.1 due to insufficient input sanitization and output escaping on user supplied attributes. This […]

CVE-2025-5845 – WordPress Affiliate Reviews Stored Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-5845 Published : July 16, 2025, 7:15 a.m. | 2 hours ago Description : The Affiliate Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘numColumns’ parameter in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, […]

CVE-2025-5843 – Brandfolder WordPress Stored Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-5843 Published : July 16, 2025, 7:15 a.m. | 2 hours ago Description : The Brandfolder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 5.0.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with […]

CVE-2025-7673 – Zyxel zhttpd Web Server Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-7673 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 16, 2025 Action […]

CVE-2025-7359 – WooCommerce Counter Live Visitors File Deletion Arbitrary Directory Vulnerability

The following table lists the changes that have been made to the CVE-2025-7359 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 16, 2025 Action […]

CVE-2025-6043 – WordPress Malware Removal Plugin File Deletion Arbitrary File Deletion Vulnerability

The following table lists the changes that have been made to the CVE-2025-6043 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 16, 2025 Action […]

CVE-2025-52690 – Cisco Wireless Access Point Remote Command Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-52690 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 5f57b9bf-260d-4433-bf07-b6a79e9bb7d4 Jul. 16, 2025 Action […]

CVE-2025-52689 – Cisco Wireless Access Point Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-52689 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 5f57b9bf-260d-4433-bf07-b6a79e9bb7d4 Jul. 16, 2025 Action […]

CVE-2025-52688 – Aruba Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-52688 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 5f57b9bf-260d-4433-bf07-b6a79e9bb7d4 Jul. 16, 2025 Action […]