CVE-2025-9653 – Portabilis i-Educar Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-9653 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 29, 2025 Action […]

CVE-2025-9652 – Portabilis i-Educar Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-9652 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 29, 2025 Action […]

CVE-2025-55304 – Exiv2 ICC Profile Parsing Denial-of-Service Vulnerability

The following table lists the changes that have been made to the CVE-2025-55304 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 29, 2025 Action […]

CVE-2025-54080 – Exiv2 Out-of-Bounds Read Denial of Service

Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions 0.28.5 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit […]

The Good, the Bad and the Ugly in Cybersecurity – Week 35

The Good, the Bad and the Ugly in Cybersecurity – Week 35 The Good | Interpol Cracks Down on Cybercrime as U.S. Sanctions North Korean IT Scheme Interpol announced the arrest of over 1200 suspects in Operation Serengeti 2.0, a three-month crackdown on cyberc … Read more Published Date: Aug 29, 2025 (22 hours, 7 minutes ago) […]

WordPress: vulnerabilities in plugins and themes | Kaspersky official blog

WordPress: vulnerabilities in plugins and themes | Kaspersky official blog The WordPress content management system (CMS) has been popping up frequently on cybersecurity news sites lately. Most of this coverage was driven by vulnerabilities in plugins and themes. However, our … Read more Published Date: Aug 29, 2025 (1 hour ago) Vulnerabilities has been mentioned in […]

CVE-2025-9651 – Shafhasan Chatbox SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-9651 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 29, 2025 Action […]

CVE-2025-9649 – “Appneta Tcpreplay Division-by-Zero Vulnerability”

The following table lists the changes that have been made to the CVE-2025-9649 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 29, 2025 Action […]

CVE-2025-9650 – Yeqifu CarRental File Path Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2025-9650 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 29, 2025 Action […]

CVE-2025-9647 – Mtons MBlog Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-9647 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 29, 2025 Action […]