CVE-2025-6080 – “WordPress Gym Management System Unauthenticated Admin Account Creation Vulnerability”
The WPGYM – WordPress Gym Management System plugin for WordPress is vulnerable to unauthorized admin account creation in all versions up to, and including, 67.7.0. This is due to the plugin not properly validating a user’s capabilities prior to adding users. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create […]
CVE-2025-6079 – “WordPress School Management System File Upload Vulnerability”
The following table lists the changes that have been made to the CVE-2025-6079 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 16, 2025 Action […]
CVE-2025-3671 – “WordPress Gym Management System – Local File Inclusion Vulnerability”
The WPGYM – WordPress Gym Management System plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 67.7.0 via the ‘page’ parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP […]
CVE-2024-8393 – Woolook Woocommerce Blocks WordPress Local File Inclusion Vulnerability
CVE ID : CVE-2024-8393 Published : Aug. 16, 2025, 4:15 a.m. | 2 hours, 19 minutes ago Description : The Woocommerce Blocks – Woolook plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.7.0 via the via the ‘tab’ parameter. This makes it possible for authenticated attackers, with Administrator-level access […]
CVE-2024-12612 – “WordPress School Management System SQL Injection”
CVE ID : CVE-2024-12612 Published : Aug. 16, 2025, 4:15 a.m. | 2 hours, 19 minutes ago Description : The School Management System for WordPress plugin for WordPress is vulnerable to SQL Injection via several parameters across multiple AJAX action in all versions up to, and including, 93.2.0 due to insufficient escaping on the user supplied parameter […]
CVE-2025-49895 – PluginBuddy.Com ServerBuddy CSRF Object Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-49895 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 16, 2025 Action […]
CVE-2024-12575 – WordPress Poll Maker Basic Information Exposure
CVE ID : CVE-2024-12575 Published : Aug. 16, 2025, 3:15 a.m. | 56 minutes ago Description : The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress is vulnerable to Basic Information Exposure in all versions up to, and including, 5.8.9 via the ‘ays_finish_poll’ AJAX action. This makes it possible for unauthenticated attackers […]
CVE-2025-55284 – Claude Code File Disclosure and Network Exfiltration
The following table lists the changes that have been made to the CVE-2025-55284 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 16, 2025 Action […]
CVE-2025-55286 – Z2D MSAA Buffer Overflow Vulnerability
z2d is a pure Zig 2D graphics library. z2d v0.7.0 released with a new multi-sample anti-aliasing (MSAA) method, which uses a new buffering mechanism for storing coverage data. This differs from the standard alpha mask surface used for the previous super-sample anti-aliasing (SSAA) method. Under certain circumstances where the path being drawn existed in whole […]
CVE-2017-20199 – Buttercup Buttercup-Browser-Extension Remote Improper Access Control Vulnerability
The following table lists the changes that have been made to the CVE-2017-20199 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 16, 2025 Action […]