CVE Alert: CVE-2025-49091
Vulnerability Summary: CVE-2025-49091 KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from...
Vulnerability Summary: CVE-2025-49091 KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from...
Vulnerability Summary: CVE-2025-5958 Use after free in Media in Google Chrome prior to 137.0.7151.103 allowed a remote attacker to potentially...
Vulnerability Summary: CVE-2025-41663 An unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH...
Vulnerability Summary: CVE-2024-35295 A vulnerability has been identified in Perfect Harmony GH180 (All versions >= V8.0 < V8.3.3 with NXGPro+...
Vulnerability Summary: CVE-2025-4798 The WP-DownloadManager plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and...
Vulnerability Summary: CVE-2025-4799 The WP-DownloadManager plugin for WordPress is vulnerable to arbitrary file deletion due to lack of restriction on...
Vulnerability Summary: CVE-2025-5395 The WordPress Automatic Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file...
Vulnerability Summary: CVE-2025-26412 The SIMCom SIM7600G modem supports an undocumented AT command, which allows an attacker to execute system commands...
Vulnerability Summary: CVE-2025-4315 The CubeWP – All-in-One Dynamic Content Framework plugin for WordPress is vulnerable to Privilege Escalation in all...
Vulnerability Summary: CVE-2025-41662 An unauthenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack...
Vulnerability Summary: CVE-2025-41661 An unauthenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack...
Vulnerability Summary: CVE-2025-4573 Mattermost versions 10.7.x
Vulnerability Summary: CVE-2025-5986 A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the...
Vulnerability Summary: CVE-2025-49710 An integer overflow was present in `OrderedHashTable` used by the JavaScript engine This vulnerability affects Firefox <...
Vulnerability Summary: CVE-2025-3302 The Xagio SEO – AI Powered SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via...
Vulnerability Summary: CVE-2025-49709 Certain canvas operations could have lead to memory corruption. This vulnerability affects Firefox < 139.0.4. Affected Endpoints:...
Vulnerability Summary: CVE-2025-4128 Mattermost versions 10.5.x
Vulnerability Summary: CVE-2025-32711 Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network. Affected...
Vulnerability Summary: CVE-2025-5687 A vulnerability in Mozilla VPN on macOS allows privilege escalation from a normal user to root. *This...
Vulnerability Summary: CVE-2025-35941 A password is exposed locally. Affected Endpoints: No affected endpoints listed. Published Date: 6/11/2025, 2:15:33 PM ⚠️...
Vulnerability Summary: CVE-2025-5144 The The Events Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-date-*’ parameters...
Vulnerability Summary: CVE-2025-40914 Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow. CryptX...
Vulnerability Summary: CVE-2025-0163 IBM Security Verify Access Appliance and Docker 10.0 through 10.0.8 could allow a remote attacker to enumerate...
Vulnerability Summary: CVE-2025-48013 Missing Authorization vulnerability in Drupal Quick Node Block allows Forceful Browsing.This issue affects Quick Node Block: from...