Aggregator
CVE-2025-31540 | acmemediakits ACME Divi Modules Plugin up to 1.3.5 on WordPress authorization
CVE-2025-31545 | WP Messiah Safe Ai Malware Protection for WP Plugin up to 1.0.20 on WordPress authorization
CVE-2025-31547 | Aphotrax Uptime Robot Plugin for WordPress up to 2.3 on WordPress sql injection
CVE-2025-31527 | Kishan WP Link Preview Plugin up to 1.4.1 on WordPress server-side request forgery
CVE-2025-31538 | checklistcom Checklist Plugin up to 1.1.9 on WordPress cross site scripting
CVE-2025-31535 | PressTigers Simple Owl Carousel Plugin up to 1.1.1 on WordPress cross site scripting
CVE-2025-31532 | Team AtomChat AtomChat Plugin up to 1.1.6 on WordPress cross site scripting
CVE-2024-55093 | phpIPAM up to 1.7.3 Install Scripts cross site scripting
CVE-2025-31533 | Salesmate Add-On for Gravity Forms Plugin up to 2.0.3 on WordPress authorization
CVE-2025-31529 | Rashid Slider Path for Elementor Plugin up to 3.0.0 on WordPress authorization
CVE-2025-31528 | wokamoto StaticPress Plugin up to 0.4.5 on WordPress authorization
CVE-2025-31526 | eleopard Behance Portfolio Manager Plugin up to 1.7.4 on WordPress sql injection
CVE-2025-31530 | smackcoders Google SEO Pressor Snippet Plugin up to 2.0 on WordPress authorization
The Hidden Breach: Secrets Leaked Outside the Codebase Pose a Serious Threat
Secrets aren't just in code. GitGuardian’s 2025 report shows major leaks in collaboration tools like Slack, Jira, and Confluence. Here’s what security teams need to know.
The post The Hidden Breach: Secrets Leaked Outside the Codebase Pose a Serious Threat appeared first on Security Boulevard.
CVE-2025-29266 | Unraid 7.0.0 Web GUI/Web Console authentication bypass by alternate name
Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands
A critical unauthenticated remote code execution vulnerability (CVE-2024-13804) has been discovered in HPE Insight Cluster Management Utility (CMU) v8.2, enabling attackers to bypass authentication mechanisms and execute commands with root privileges on the backend server. This high-severity vulnerability affects a tool designed for managing high-performance computing clusters, potentially giving attackers complete control over entire computing […]
The post Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands appeared first on Cyber Security News.