CVE-2025-8146 – “Qi Addons For Elementor Stored Cross-Site Scripting”

CVE ID : CVE-2025-8146 Published : Aug. 2, 2025, 5:15 a.m. | 26 minutes ago Description : The Qi Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s TypeOut Text widget in all versions up to, and including, 1.9.2 due to insufficient input sanitization and output escaping on user supplied […]

CVE-2025-7694 – WordPress Woffice Core Plugin File Deletion Vulnerability

CVE ID : CVE-2025-7694 Published : Aug. 2, 2025, 4:15 a.m. | 1 hour, 25 minutes ago Description : The Woffice Core plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the woffice_file_manager_delete() function in all versions up to, and including, 5.4.26. This makes it possible for authenticated attackers, with […]

CVE-2025-6077 – Partner Software’s Partner Software Product and Web Application Default Administrator Credentials Vulnerability

The following table lists the changes that have been made to the CVE-2025-6077 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 02, 2025 Action […]

CVE-2025-6078 – Partner Software’s Partner Software Stored XSS Vulnerability

The following table lists the changes that have been made to the CVE-2025-6078 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 02, 2025 Action […]

CVE-2025-6076 – Partner Software’s Partner Software and Partner Web application File Upload Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-6076 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 02, 2025 Action […]

Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections

Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections A newly identified threat actor designated Storm-2603 has emerged as a sophisticated adversary in the ransomware landscape, leveraging advanced custom malware to circumvent endpoint security protectio … Read more Published Date: Aug 02, 2025 (34 minutes ago) Vulnerabilities has been mentioned in this article. […]

CVE-2025-54796 – Copyparty Denial of Service (DoS) Regular Expression Injection

The following table lists the changes that have been made to the CVE-2025-54796 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 02, 2025 Action […]

CVE-2025-54790 – Apache Files SQL Injection

The following table lists the changes that have been made to the CVE-2025-54790 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 02, 2025 Action […]

CVE-2025-54789 – Apache Files Cross-Site Scripting (XSS)

The following table lists the changes that have been made to the CVE-2025-54789 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 02, 2025 Action […]