CVE-2025-30635 – ThemeAtelier IDonatePro PHP Remote File Inclusion Vulnerability
The following table lists the changes that have been made to the CVE-2025-30635 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-28979 – ThimPress WP Pipes PHP Remote File Inclusion Vulnerability
The following table lists the changes that have been made to the CVE-2025-28979 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
Vulnerability in Akcess-Net Lepszy BIP software
Vulnerability in Akcess-Net Lepszy BIP software Vulnerability in Akcess-Net Lepszy BIP software CVE ID CVE-2025-7761 Publication date 14 August 2025 Vendor Akcess-Net Product Lepszy BIP Vulnerable versions All Vulnerability type (CWE) Improper Neut … Read more Published Date: Aug 14, 2025 (45 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-7761
Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)
Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876) Two vulnerabilities (CVE-2025-8875, CVE-2025-8876) in N-central, a remote monitoring and management (RMM) solution by N-able that’s popular with managed service providers, are being exploited by attac … Read more Published Date: Aug 14, 2025 (1 hour, 15 minutes ago) Vulnerabilities has been mentioned in this article.
CVE-2025-8954 – PHPGurukul Hospital Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-8954 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-8952 – Campcodes Online Flight Booking Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-8952 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-8953 – SourceCodester COVID 19 Testing Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-8953 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-5998 – WordPress PPWP Password Authorization Information Disclosure
CVE ID : CVE-2025-5998 Published : Aug. 14, 2025, 9:15 a.m. | 21 minutes ago Description : The PPWP – Password Protect Pages WordPress plugin before version 1.9.11 allows to put the site content behind a password authorization, however users with subscriber or greater roles can view content via the REST API. Severity: 0.0 | NA […]
CVE-2025-54472 – Apache bRPC Redis Protocol Parser Integer Overflow Denial of Service
Unlimited memory allocation in redis protocol parser in Apache bRPC (all versions < 1.14.1) on all platforms allows attackers to crash the service via network. Root Cause: In the bRPC Redis protocol parser code, memory for arrays or strings of corresponding sizes is allocated based on the integers read from the network. If the integer […]
CVE-2025-48862 – CtrlX OS Unencrypted Backup File Exposure
The following table lists the changes that have been made to the CVE-2025-48862 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]