CVE-2025-54757 – PowerCMS Cross-Site Scripting (XSS) Vulnerability
The following table lists the changes that have been made to the CVE-2025-54757 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]
CVE-2025-54752 – PowerCMS CSV Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-54752 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]
CVE-2025-46359 – PowerCMS Path Traversal RCE Vulnerability
The following table lists the changes that have been made to the CVE-2025-46359 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]
CVE-2025-41391 – PowerCMS Cross-Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2025-41391 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]
CVE-2025-41396 – PowerCMS Path Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-41396 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]
CVE-2025-36563 – PowerCMS Cross-Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2025-36563 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]
CVE-2025-8371 – Code-projects Exam Form Submission SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-8371 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]
CVE-2025-8370 – Portabilis i-Educar Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-8370 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 31, 2025 Action […]
AURORA – Leveraging ETW for Advanced Threat Detection
AURORA – Leveraging ETW for Advanced Threat Detection Aurora is a lightweight endpoint agent that applies Sigma rules and IOCs directly to Windows system events reconstructed from Event Tracing for Windows (ETW). Unlike traditional logging tools or Sysmo … Read more Published Date: Jul 31, 2025 (56 minutes ago) Vulnerabilities has been mentioned in this article. […]
Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install
Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install Jul 31, 2025Ravie LakshmananVulnerability / Website Security Threat actors are actively exploiting a critical security flaw in “Alone – Charity Multipurpose Non-profit WordPress Theme” to take over … Read more Published Date: Jul 31, 2025 (3 hours, 16 minutes ago) Vulnerabilities has been mentioned […]