CVE-2025-7808 – Shopify WP WordPress Stored Cross-Site Scripting
CVE ID : CVE-2025-7808 Published : Aug. 14, 2025, 6:15 a.m. | 1 hour, 21 minutes ago Description : The WP Shopify WordPress plugin before 1.5.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin […]
CVE-2025-6790 – Quiz and Survey Master WordPress CSRF Vulnerability
CVE ID : CVE-2025-6790 Published : Aug. 14, 2025, 6:15 a.m. | 1 hour, 21 minutes ago Description : The Quiz and Survey Master (QSM) WordPress plugin before 10.2.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack. Severity: […]
CVE-2025-3414 – WordPress Structured Content (JSON-LD) Stored Cross-Site Scripting Vulnerability
CVE ID : CVE-2025-3414 Published : Aug. 14, 2025, 6:15 a.m. | 1 hour, 21 minutes ago Description : The Structured Content (JSON-LD) #wpsc WordPress plugin before 1.7.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor […]
CVE-2025-8938 – TOTOLINK N350R Telnet Service Remote Backdoor Vulnerability
The following table lists the changes that have been made to the CVE-2025-8938 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-8937 – TOTOLINK N350R Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-8937 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-8936 – “1000 Projects Sales Management System SQL Injection”
The following table lists the changes that have been made to the CVE-2025-8936 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-5942 – Netskope NS Client Windows Heap Overflow Denial-of-Service
The following table lists the changes that have been made to the CVE-2025-5942 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-5941 – Netskope NS Client DNS Memory Leak
The following table lists the changes that have been made to the CVE-2025-5941 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2025-0309 – Netskope Client TLS Certificate Validation Bypass Privilege Elevation Vulnerability
The following table lists the changes that have been made to the CVE-2025-0309 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]
CVE-2024-7402 – Netskope Client Administrative Privilege Escalation and Configuration Tampering Vulnerability
The following table lists the changes that have been made to the CVE-2024-7402 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 14, 2025 Action […]