CVE-2025-58910 – Apache Web Server SQL Injection

The following table lists the changes that have been made to the CVE-2025-58910 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Sep. 06, 2025 Action Type […]

CVE-2025-58909 – OpenVAS Scanner Not Used

The following table lists the changes that have been made to the CVE-2025-58909 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Sep. 06, 2025 Action Type […]

CVE-2025-58908 – Apache Struts Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-58908 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Sep. 06, 2025 Action Type […]

CVE-2025-58907 – Apache HTTP Server Cross-Site Request Forgery

The following table lists the changes that have been made to the CVE-2025-58907 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Sep. 06, 2025 Action Type […]

CVE-2025-58906 – Apache HTTP Server Information Disclosure

The following table lists the changes that have been made to the CVE-2025-58906 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Sep. 06, 2025 Action Type […]

CVE-2025-58904 – Apache HTTP Server Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-58904 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Sep. 06, 2025 Action Type […]

CVE-2025-58437 – Coder’s privilege escalation vulnerability could lead to a cross workspace compromise

The following table lists the changes that have been made to the CVE-2025-58437 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 06, 2025 Action […]

CVE-2025-10003 – UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP <= 1.2.44 – Authenticated (Subscriber+) SQL Injection

CVE ID : CVE-2025-10003 Published : Sept. 6, 2025, 2:24 a.m. | 15 minutes ago Description : The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘upload_file_remove’ function and ‘htmlvar’ parameter in all versions up to, and including, […]

CVE-2025-8359 – AdForest <= 6.0.9 – Authentication Bypass to Admin

CVE ID : CVE-2025-8359 Published : Sept. 6, 2025, 2:24 a.m. | 15 minutes ago Description : The AdForest theme for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 6.0.9. This is due to the plugin not properly verifying a user’s identity prior to authenticating them. This makes it possible for […]