CVE-2025-54309 – Critical Authentication Bypass in CrushFTP
CVE-2025-54309 – Critical Authentication Bypass in CrushFTP Skip to content July 22, 2025OverviewCVE-2025-54309 is a critical security vulnerability in the CrushFTP Managed File Transfer Server, allowing unauthenticated remote attackers to completely bypass au … Read more Published Date: Jul 22, 2025 (10 hours, 19 minutes ago) Vulnerabilities has been mentioned in this article.
CVE-2025-6831 – The User Registration plugin for WordPress is vuln
CVE ID : CVE-2025-6831 Published : July 22, 2025, 2:15 a.m. | 8 hours, 1 minute ago Description : The User Registration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s urcr_restrict shortcode in all versions up to, and including, 4.2.4 due to insufficient input sanitization and output escaping on user supplied attributes. This […]
CVE-2025-5240 – The CRM and Lead Management by vcita plugin for Wo
CVE ID : CVE-2025-5240 Published : July 22, 2025, 2:15 a.m. | 8 hours, 1 minute ago Description : The CRM and Lead Management by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘type’ parameter in all versions up to, and including, 2.7.5 due to insufficient input sanitization and output escaping. This makes […]
CVE-2015-10137 – The Website Contact Form With File Upload plugin f
CVE ID : CVE-2015-10137 Published : July 22, 2025, 2:15 a.m. | 8 hours, 1 minute ago Description : The Website Contact Form With File Upload plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ‘upload_file()’ function in versions up to, and including, 1.3.4. This makes it possible for […]
CVE-2012-10020 – The FoxyPress plugin for WordPress is vulnerable t
CVE ID : CVE-2012-10020 Published : July 22, 2025, 2:15 a.m. | 8 hours, 1 minute ago Description : The FoxyPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the uploadify.php file in versions up to, and including, 0.4.2.1. This makes it possible for unauthenticated attackers to upload arbitrary […]
CVE-2025-7945 – A vulnerability was found in D-Link DIR-513 up to
The following table lists the changes that have been made to the CVE-2025-7945 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
Proactive Security and Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771)
Proactive Security and Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771) Exploits & Vulnerabilities CVE-2025-53770 and CVE-2025-53771 are vulnerabilities in on-premise Microsoft SharePoint Servers that evolved from previously patched flaws, allowing unauthenticated remote … Read more Published Date: Jul 22, 2025 (12 hours, 50 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-53771 CVE-2025-53770 CVE-2025-49706 CVE-2025-49704 CVE-2025-0411
CVE-2025-7944 – A vulnerability was found in PHPGurukul Taxi Stand
The following table lists the changes that have been made to the CVE-2025-7944 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-7486 – The Ebook Store plugin for WordPress is vulnerable
CVE ID : CVE-2025-7486 Published : July 21, 2025, 11:15 p.m. | 1 hour, 16 minutes ago Description : The Ebook Store plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Order Details in all versions up to, and including, 5.8012 due to insufficient input sanitization and output escaping. This makes it possible for authenticated […]
CVE-2025-7943 – A vulnerability was found in PHPGurukul Taxi Stand
The following table lists the changes that have been made to the CVE-2025-7943 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.