cve_id
stringlengths
13
15
summary
stringlengths
15
4k
description_hash
stringlengths
64
64
published_date
timestamp[us, tz=UTC]date
2025-07-31 14:15:34
2025-10-29 13:15:34
modified_date
timestamp[us, tz=UTC]date
2025-07-31 18:42:37
2025-10-29 13:53:20
is_rejected
bool
2 classes
source
stringclasses
1 value
source_url
stringclasses
7 values
retrieved_at
timestamp[us, tz=UTC]date
2025-10-29 13:52:01
2025-10-29 13:52:01
source_record_hash
stringlengths
64
64
CVE-2025-8400
The Image Gallery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
1c48cd211ec3690451b2bf5fa5623da4d6ddfc432b313ece7d30970b2be2b831
2025-08-02T09:15:48.547000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
82f8fd0cba3a600972da244fa95e83e0e7d4d8991b5d08c2564a809b3c442b37
CVE-2025-8466
A vulnerability was found in code-projects Online Farm System 1.0. It has been classified as critical. Affected is an unknown function of the file /forgot_passfarmer.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
08a10b9136d9f9978dafac06c08533b055506095b069d931fee1a67e6ac776b2
2025-08-02T09:15:48.803000Z
2025-08-05T18:33:15.147000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
447336ff89170a8428d732f825cf6a80d0c4e2e56ba26f24e6d16d3e97102862
CVE-2025-6722
The BitFire Security – Firewall, WAF, Bot/Spam Blocker, Login Security plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.5 via the bitfire_* directory that automatically gets created and stores potentially sensitive files without any access restrictions. This makes it possible for unauthenticated attackers to extract sensitive data from various files like config.ini, debug.log, and more when directory listing is enabled on the server and the ~/wp-content/plugins/index.php file is missing or ignored.
e6bef484824f420622bc28ab72f21ec9d94e192315ba61d7be2912321fe4a2d4
2025-08-02T10:15:25.310000Z
2025-08-25T14:15:36.483000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
7165e74ac35da22ff8c3cfe81dc4516c45411114dc08b6fa3669a4929ae01333
CVE-2025-8488
The Ultimate Addons for Elementor (Formerly Elementor Header & Footer Builder) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_hfe_compatibility_option_callback ()function in all versions up to, and including, 2.4.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the compatibility option setting.
5758eeadf175c37998d76ae22215776bfea164b2910dcdb4cc4cc13799fd15f4
2025-08-02T10:15:27.477000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
f2d208e2d7c0f4a626f96426a3e46d4fb368830084edaeef57792fd4b23532ad
CVE-2025-8467
A vulnerability was found in code-projects Wazifa System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /controllers/regcontrol.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
dab77a66347bd6ee88e8c4709d42bf414b84ad34d9f867ba0f662d8c03f9e5fa
2025-08-02T11:15:25.450000Z
2025-08-05T18:33:02.347000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
716e2ff421f716caf35a2b67ab701c96de9f1097a78e613aee71135203857d3d
CVE-2025-7500
The Ocean Social Sharing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via social icon titles in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
f8750831170414006344ff42da68dded1e35f771055b7c9cfac666eac3ca3b4b
2025-08-02T12:15:28.050000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
bcc3c11344fd86f764fee7ed68380cb7c5401cdc14919efdf4c7e3c313330d7a
CVE-2025-7710
The Brave Conversion Engine (PRO) plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 0.7.7. This is due to the plugin not properly restricting a claimed identity while authenticating with Facebook. This makes it possible for unauthenticated attackers to log in as other users, including administrators.
84f9491f2741e0379f60b227c2279b58796fce3cb69c9289cafd7923be733ade
2025-08-02T12:15:28.280000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
24a2fd90af614c316a44cfd6070c2c420a83d492b54e0df2926f4f6fb25bdf10
CVE-2025-8468
A vulnerability was found in code-projects Wazifa System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /controllers/reset.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
f495128bfc4a296e7e5ff5c1c15ec0817f8e7e9fa3da3586072b337d2f12f6f6
2025-08-02T15:15:26.753000Z
2025-08-05T18:32:50.010000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
7d3b125ae940732f461fa357adc0e95426e55b512993eac4367bde9ae0be2264
CVE-2025-8469
A vulnerability classified as critical has been found in SourceCodester Online Hotel Reservation System 1.0. This affects an unknown part of the file /admin/deletegallery.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
cb6d4439dda00c2f761b5e8cae9e41227e3ab5ed39c55f5237dc8ded21a2cf62
2025-08-02T17:15:26.477000Z
2025-08-05T18:25:50.207000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
80534c85de16730554350862dc3d81da52e0b9d13eb70492acaac939cad763db
CVE-2025-8470
A vulnerability classified as critical was found in SourceCodester Online Hotel Reservation System 1.0. This vulnerability affects unknown code of the file /admin/deleteroom.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
799a30cf53963b8816c8c03c7e7ec5c70a149ca0684a26ba11e7576d66513ceb
2025-08-02T18:15:26.337000Z
2025-08-05T18:25:32.497000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
6df0aae139a7847484d9888861fcb1b711715c6b2acf4153d2af3fafca7c610b
CVE-2025-8471
A vulnerability, which was classified as critical, has been found in projectworlds Online Admission System 1.0. This issue affects some unknown processing of the file /adminlogin.php. The manipulation of the argument a_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
3601459fb3a63b6d54db38aa73195b8b854a461e2eb7293a8006d6e8c9f24b89
2025-08-02T19:15:25.460000Z
2025-08-05T18:25:08.913000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
355f83577e52e5805dd50fe683eb540991d69d35fcb39946f1f2618bdc78a86e
CVE-2025-23276
NVIDIA Installer for Windows contains a vulnerability where an attacker may be able to escalate privileges. A successful exploit of this vulnerability may lead to escalation of privileges, denial of service, code execution, information disclosure and data tampering.
e295d3cc967eac390b5bdad57fcdf65e4a320d222ada38ca0b79dc12d083838e
2025-08-02T22:15:44.290000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
c20ebc3a986f0e9a70b0f44eb7fbf42c83304baaa50c07a0d941f6f8d1415b79
CVE-2025-23277
NVIDIA Display Driver for Linux and Windows contains a vulnerability in the kernel mode driver, where an attacker could access memory outside bounds permitted under normal use cases. A successful exploit of this vulnerability might lead to denial of service, data tampering, or information disclosure.
8220107f6e378db3deff36ec2ea306f22caab1fc1be61d1b79b2052d56151d7d
2025-08-02T22:15:44.487000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
375c1807ec586d4aa6a5268be944f90ede88cb81da6bc17d2e185a42c8ed7547
CVE-2025-23278
NVIDIA Display Driver for Windows and Linux contains a vulnerability where an attacker might cause an improper index validation by issuing a call with crafted parameters. A successful exploit of this vulnerability might lead to data tampering  or denial of service.
db61b38a2848bad48583a401513305576e9874d48872348d0db3dcd2418098f3
2025-08-02T22:15:44.657000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
1cb1d58d77b7aaee8e95a077603d6d2b2c64c569de3228c8c4730790b0b42a6d
CVE-2025-23279
NVIDIA .run Installer for Linux and Solaris contains a vulnerability where an attacker could use a race condition to escalate privileges. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, denial of service, or data tampering.
188db4bbc9112e9661fd95ab6c067c11bea3fd2bb408049547dc82e7835f2729
2025-08-02T22:15:44.830000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
3921e02407df6030a8ea5331697516755784ee247956da3b3d4a41cfe625de2d
CVE-2025-23281
NVIDIA GPU Display Driver for Windows contains a vulnerability where an attacker with local unprivileged access that can win a race condition might be able to trigger a use-after-free error. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.
820a33b846b864b1e64a66bc4de62854da1c67e54264cca149f812cc08140402
2025-08-02T22:15:44.993000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
07b0f273daea7c2047f9eae7d55e050b36151b1bdb92f43dc7a505e94e1ddb72
CVE-2025-23283
NVIDIA vGPU software for Linux-style hypervisors contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause stack buffer overflow. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
123514eafd0e6780e98fecdd25db75b6b8cc71699884570e663e8282af429a4f
2025-08-02T22:15:45.160000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
3df28c448b149031bb7bf1c6e917194dd358908d5aa0477d2542fa3373216898
CVE-2025-23286
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where an attacker could read invalid memory. A successful exploit of this vulnerability might lead to information disclosure.
04be22ed55a7d8e727c477d510bdcad7964dfc6dc2d8f6c6010d7c128b1aa311
2025-08-02T22:15:45.327000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
cf961e58645efcc0eccd758b73978c75572566d283d8ea4f4485031c6600959c
CVE-2025-23287
NVIDIA GPU Display Driver for Windows contains a vulnerability where an attacker may access sensitive system-level information. A successful exploit of this vulnerability may lead to Information disclosure.
9a25df1278682b7188fc621ae9b66253884aa63c2e711b0d8d36f1882175a3d2
2025-08-02T22:15:45.493000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
64458b5eff69bde583e34e22bc6b335f4c96f68006819f7480b817d7b5c72777
CVE-2025-23288
NVIDIA GPU Display Driver for Windows contains a vulnerability  where an attacker may cause an exposure of sensitive system information with local unprivileged system access. A successful exploit of this vulnerability may lead to Information disclosure.
0bdb8180f48f2c3777ec08c514a52c213b636e5f372d42ce438971f8e5d416a3
2025-08-02T22:15:45.660000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
282246b6e5c17da4dd9a77f9a478ee836dcba149703c65d2c7c0bd7ad91d277e
CVE-2023-32253
A flaw was found in the Linux kernel's ksmbd component. A deadlock is triggered by sending multiple concurrent session setup requests, possibly leading to a denial of service.
cd0b8d30cb624aafb000d0186170c8e5bc8f5631f211f4013c0fcc37d9ae7a44
2025-08-02T23:15:24.770000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
b678b480f29525cc785c5a4e0790945b5d7221941c78c083982f5e7f37abe83a
CVE-2023-32255
A flaw was found in the Linux kernel's ksmbd component. A memory leak can occur if a client sends a session setup request with an unknown NTLMSSP message type, potentially leading to resource exhaustion.
fa7dd94b6dc0d568981962df1910381a45f2acbb2c179a237745a243335c24f2
2025-08-02T23:15:25.820000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
4b34e230a799251ee68a9a174e7984262e47ddeb5607974fec015e8393f097bf
CVE-2025-23284
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause a stack buffer overflow. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, or data tampering.
be28e634675fe9072d0535ab81ce2ec272b92e54e49530bb440e95b0536aa1d4
2025-08-02T23:15:26.377000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
4164809aad1a6395a46db6366828fe9ceed5c004f680083d3358ad719bf5ae73
CVE-2025-23285
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where it allows a guest to access global resources. A successful exploit of this vulnerability might lead to denial of service.
d92e667396b43275b8d1753230adf620082d4ebcdcbce47e9ba9d89311df6260
2025-08-02T23:15:26.617000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
4ec3a23ac1a343c2e6ef36e17ed9f89b47a2563a9d935b3a0649033278bd4843
CVE-2025-23290
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a guest could get global GPU metrics which may be influenced by work in other VMs. A successful exploit of this vulnerability might lead to information disclosure.
59c3e8c8cd91b1ad3ea0c259f8d1e16fe374a6446a493f3fb67a72f1d278e8e2
2025-08-02T23:15:26.780000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
5de16381e51ccfcad2f874f72d932eb60c3e4f3605c7cb75ef9d38bb1c3ed05e
CVE-2025-8493
A vulnerability classified as critical was found in code-projects Intern Membership Management System 1.0. This vulnerability affects unknown code of the file /admin/edit_student_query.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
bb84d3492d0fe4fb3399ea163d961723f8b348c992484af899896bc08dcf6cfc
2025-08-02T23:15:26.943000Z
2025-08-05T18:22:55.830000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
312d91f5bd6346d402372b1ee5c063c133551f10280cdda65e3630605f6105df
CVE-2025-54955
OpenNebula Community Edition (CE) before 7.0.0 and Enterprise Edition (EE) before 6.10.3 have a critical FireEdge race condition that can lead to full account takeover. By exploiting this, an unauthenticated attacker can obtain a valid JSON Web Token (JWT) belonging to a legitimate user without knowledge of their credentials.
d9352f655aa14fd310c82815ba300f9fd0846dde4c8eca177d8292736547328b
2025-08-03T00:15:25.633000Z
2025-08-04T16:15:34.340000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
3b9a592e8a3244556198973c57d1573b759c352ebc6269b9daeb869100573b9c
CVE-2025-8494
A vulnerability, which was classified as critical, has been found in code-projects Intern Membership Management System 1.0. This issue affects some unknown processing of the file /admin/delete_student.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
5b25f3dbfb91c2e27588f445d14887880ab2a2d9e6e2b036cd7251e89f5bf2a3
2025-08-03T00:15:25.850000Z
2025-08-05T18:43:56.300000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
85e6c2268e42c3265c3c34bdd7046990bfa473724ff6dbcc6e839dcf358f5a2b
CVE-2025-54349
In iperf before 3.19.1, iperf_auth.c has an off-by-one error and resultant heap-based buffer overflow.
5ddd0ce5c7ccb08db63440ec733a8b832f6e590de0b179db1f1281cdc19cd706
2025-08-03T02:15:35.597000Z
2025-10-17T19:46:28.300000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
96762a6fad8a9f90a204d7a53008202c160173772b8451547709de1b935765f7
CVE-2025-54350
In iperf before 3.19.1, iperf_auth.c has a Base64Decode assertion failure and application exit upon a malformed authentication attempt.
b27166b499031d9558f075c132f05b061badc5dea2af0b9400e6b018ca0f0cf1
2025-08-03T02:15:37.193000Z
2025-10-17T19:59:44.643000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
46eb9da5cbc5f11500c9132c146de2ba4f44637029891b046d02ad2e1c7e7a22
CVE-2025-54351
In iperf before 3.19.1, net.c has a buffer overflow when --skip-rx-copy is used (for MSG_TRUNC in recv).
f71a132195cb31d5eebc01a548dc6b65183f50ef9d2e47fbb565774580632198
2025-08-03T02:15:37.380000Z
2025-10-17T19:59:58.313000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
82c2529cfa986f1440113d28fcd10af582578373e0415b96fdda858bdb04e348
CVE-2025-8495
A vulnerability, which was classified as critical, was found in code-projects Intern Membership Management System 1.0. Affected is an unknown function of the file /admin/edit_admin_query.php. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
fa1377010550d64f4bdc2ef366eb18f5bb15166334bb497cf2d9fb993073f270
2025-08-03T02:15:37.560000Z
2025-08-08T16:22:47.703000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
0cf2148427a15dc65f7770953c574746068ba9fe49bb07a9bbd947bd0510a87a
CVE-2025-52131
The Mocca Calendar application before 2.15 for XWiki allows XSS via the background or text color field.
7222d0a522beafd949cabd422293d413c80a9a418f0fbd2db0d9272547e35a37
2025-08-03T04:15:37.940000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
f514bf4aa8596c896febd441f779df4120e2620d0a333e6a09b928fad0986e5a
CVE-2025-52132
The Mocca Calendar application before 2.15 for XWiki allows XSS via a title to the view event page.
954e1fac617a70f1284496c18ad4d247ed02f91007ec973f3e0563dffa237359
2025-08-03T04:15:46.263000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
5b7258fcc0a987d409702b645980ff6c26c1fbb0d5f3093cb4cb91cba50a76ff
CVE-2025-52133
The Mocca Calendar application before 2.15 for XWiki allows XSS via a title upon calendar import.
8dea63c3123f08a2da39a62f2853a006b409c78cceed1bcff4d56a8d5bafb368
2025-08-03T04:15:47.167000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
94f6a1368b9b6903a2eb4e1b03151aa5f912aee76cbc1342da5620d0d9914e0b
CVE-2025-8496
A vulnerability has been found in projectworlds Online Admission System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /viewform.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
f31abf3317f4294590240a0af78d631d5af7fd3db247a07dd2a6a85c08056386
2025-08-03T04:15:49.543000Z
2025-08-08T16:23:06.237000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
06bbe87ebafbf8e2a22e677dd6ad7de340f8ba9f37ea4532c7914502371f1da0
CVE-2025-8497
A weakness has been identified in code-projects Online Medicine Guide 1.0. This affects an unknown part of the file /cusfindphar2.php. This manipulation of the argument Search causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
57d45e54cf1ecb917311c0aed988ca0466e604d826a07a8e1276ab0b2505a987
2025-08-03T04:15:51.867000Z
2025-09-29T21:27:58.667000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
2883677326f0406579b54e6531d4ec99182c7eb66fdc2fd2916c1bbd8365b5a7
CVE-2025-8498
A security vulnerability has been detected in code-projects Online Medicine Guide 1.0. This vulnerability affects unknown code of the file /cart/index.php. Such manipulation of the argument uname leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
23b64da5bbe221b8c3a1a6da7ea713da33b1eb6ffbb2f4c0b59b098916af1b98
2025-08-03T04:15:53.443000Z
2025-09-29T21:28:28.823000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
10ddf38f1433b3ac890c097579e1851abcec8e3a36c58a1f7d0330d9f4aafd99
CVE-2025-8499
A vulnerability was found in code-projects Online Medicine Guide 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /cusfindambulence2.php. The manipulation of the argument Search leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
b8521eee6bf7a899859b4daa066daac20fdb52faab79211855a8b202e1b32219
2025-08-03T05:15:25.713000Z
2025-08-05T14:45:23.793000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
07975ed1408edd53e1ec31ba046e72c97047d2d61c324f007b498858dab3cf5e
CVE-2025-8500
A vulnerability was found in code-projects Human Resource Integrated System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /insert-and-view/action.php. The manipulation of the argument content leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
e12ebf852dbc8ccda4d7e29708601f0ae5db833f0361415a192ef36fce1ec451
2025-08-03T05:15:25.963000Z
2025-10-23T20:06:00.793000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
1cee360acd5e29e6aca7f29975d85e85ba26eabd65543e88a1167f194bcc299f
CVE-2025-8501
A vulnerability classified as problematic has been found in code-projects Human Resource Integrated System 1.0. Affected is an unknown function of the file /insert-and-view/action.php. The manipulation of the argument content leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
8df1a1884d041156bfcf5c280f23262039d20dd25b319229bd842291d49d77cf
2025-08-03T06:15:31.617000Z
2025-10-23T20:06:00.793000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
2b28f328fbfed7494e50e8b04990419a380e2c978c66f0ee8ff27826a672e437
CVE-2025-8502
A vulnerability classified as critical was found in code-projects Online Medicine Guide 1.0. Affected by this vulnerability is an unknown functionality of the file /changepass.php. The manipulation of the argument ups leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
b40ea864fe5be6e21b91cef8b7f14c8370fbc0ce9e189a3336cae4ef50f65223
2025-08-03T07:15:24.200000Z
2025-08-05T14:45:04.403000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
fd9b87ba55d0d96af5ad0ef31061e2c77efad0481d70c5dd7060072795c3da24
CVE-2025-8503
A vulnerability, which was classified as critical, has been found in code-projects Online Medicine Guide 1.0. Affected by this issue is some unknown functionality of the file /adaddmed.php. The manipulation of the argument mname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
18d908c34ade4cc8518d59b5478de0b1dcf42121bf0246788c2820a0457033a6
2025-08-03T07:15:25.467000Z
2025-08-05T14:43:25.300000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
2036afe2146738d80787bf7ebbb9b6b391042bad005a6a2eb8d15d1b77f18370
CVE-2025-8504
A vulnerability, which was classified as critical, was found in code-projects Kitchen Treasure 1.0. This affects an unknown part of the file /userregistration.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
560056e12547e69efa96ca7a3fef988ddeabed056f16f6b4effd1f8712af15b1
2025-08-03T08:15:24.290000Z
2025-08-08T16:23:15.553000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
48df21b1b8aa811eddfcf5b6c98a4cdcd303706563064fd6b8abf5d70ca62330
CVE-2025-8505
A vulnerability has been found in 495300897 wx-shop up to de1b66331368695779cfc6e4d11a64caddf8716e and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
aab1ae573b9b21f1d18b264d5988d7d5e250b6e438f2897426be87bc8fa588fa
2025-08-03T08:15:25.210000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
1f364c9f684fc88894c7c3974de7d711d425b14a0205bb2c25f79673a37b13ab
CVE-2025-8506
A vulnerability was found in 495300897 wx-shop up to de1b66331368695779cfc6e4d11a64caddf8716e and classified as problematic. This issue affects some unknown processing of the file /user/editUI. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
f898f8d065e849af273c053bf7d0cd792535e965823983c2eb55a4b0e3978500
2025-08-03T09:15:29.130000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
388f68368c650372efd7fc7f7a7d8a28ba219333dc0d5ce94f5d2882165d3167
CVE-2024-41177
Incomplete Blacklist to Cross-Site Scripting vulnerability in Apache Zeppelin. This issue affects Apache Zeppelin: before 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue.
01ab57ae65ede3c7afa4e7d8f2aa0e8f95db952d5a9ae6191b9ef7796cf0d7c6
2025-08-03T10:15:27.240000Z
2025-08-05T16:35:15.320000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
cd5611c34714cb885bf797316cce8d263a7777b8a1d17f6a3a4a1baf7830ccfb
CVE-2024-52279
Improper Input Validation vulnerability in Apache Zeppelin. The fix for JDBC URL validation in CVE-2024-31864 did not account for URL encoded input. This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue.
3b95eaeb5b5a2932881872af8e2b717c7dc8aea9a56d46b8a52007caa3eea779
2025-08-03T10:15:27.517000Z
2025-08-05T18:44:32.057000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
d35ec7073b70192e24b217703b011428ffa7983fee46d8d37c80cf3a252737db
CVE-2025-8507
A vulnerability was found in Portabilis i-Educar 2.9. It has been classified as problematic. Affected is an unknown function of the file /intranet/educar_funcao_lst.php. The manipulation of the argument nm_funcao/abreviatura leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
fb2dc09ac74565aef0d1c5e020d30ffffa79498bd0ff8d39408a6aeca21e5aa9
2025-08-03T10:15:27.690000Z
2025-08-12T17:47:42.587000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
f3e818118fb0d120febddc13786da038066ff3813f91d4f066c2e450fc08781a
CVE-2024-51775
Missing Origin Validation in WebSockets vulnerability in Apache Zeppelin. The attacker could access the Zeppelin server from another origin without any restriction, and get internal information about paragraphs.  This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue.
5b045714a1b98e07445683bb302d0590bb6bc42b35fd4f946ddaece41cdaea12
2025-08-03T11:15:26Z
2025-08-05T16:15:28.490000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
11492ff5b86b68329e8e8dbf0645e202c48001faedac50722b13c254de85e51d
CVE-2025-8508
A vulnerability was found in Portabilis i-Educar 2.9. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /intranet/educar_avaliacao_desempenho_cad.php. The manipulation of the argument titulo_avaliacao/descricao leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
856b93b51938509345354c02057fed9b6d17c5eb96cf6e069c0ce99e4dbbdf58
2025-08-03T11:15:26.167000Z
2025-08-12T17:47:33.960000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
03a3d8fea2e42004a8b24a79ff071145243ffb4f4d6fef4b18857c8dcfde073b
CVE-2025-8509
A vulnerability was found in Portabilis i-Educar 2.9. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /intranet/educar_servidor_cad.php. The manipulation of the argument matricula leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
89148c8f5961fe31ddc3c0d2e12a6e4185844b72c6006711094f58a57fb783e6
2025-08-03T13:15:25.597000Z
2025-08-12T17:47:26.697000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
f5c920a4a618d8a5556931d4987ebf796244f59f08f8f939c64d30eba685a5dd
CVE-2025-8510
A vulnerability classified as problematic has been found in Portabilis i-Educar 2.10. This affects the function Gerar of the file ieducar/intranet/educar_matricula_lst.php. The manipulation of the argument ref_cod_aluno leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 82c288b9a4abb084bdfa1c0c4ef777ed45f98b46. It is recommended to apply a patch to fix this issue. The vendor initially closed the original advisory without requesting a CVE.
5397c32d3ee0ba7ba226fb0a54affaa604a2076cdfec5ae23688ad511995fd6e
2025-08-03T13:15:26.300000Z
2025-08-12T17:47:11.327000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
88744505e81fd383a2f759d6fd508df2d3beff843cfcdbac8424757f399da8f4
CVE-2025-8511
A vulnerability classified as problematic was found in Portabilis i-Diario 1.5.0. This vulnerability affects unknown code of the file /diario-de-observacoes/ of the component Observações. The manipulation of the argument Descrição leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
5b1bafdd9d5d859ccb8f28ad07c4c3d1c34ed50f5a3f12f441ec023a9fd07b5d
2025-08-03T14:15:26.010000Z
2025-09-11T14:36:04.480000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
8b71d860b5b23983728579dd5a62b3e47f2116edf4537e21f1398c277d559f24
CVE-2025-8512
A vulnerability, which was classified as problematic, has been found in TVB Big Big Shop App 2.9.0 on Android. This issue affects some unknown processing of the file AndroidManifest.xml of the component hk.com.tvb.bigbigshop. The manipulation leads to improper export of android application components. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
50aa7085c2f3640eca66fb893f4a6d48672d3290b807ec49600083537661c157
2025-08-03T14:15:26.737000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
2ab56a71735d52d75fef0642352e2379256642e8d5835ee98ba842b1847d884e
CVE-2025-8513
A vulnerability, which was classified as problematic, was found in Caixin News App 8.0.1 on Android. Affected is an unknown function of the file AndroidManifest.xml of the component com.caixin.news. The manipulation leads to improper export of android application components. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
4117d30c500476caad1152dbb21b4abab64de8c4a5185d0c96e1ec4b2bb1fd15
2025-08-03T15:15:38.920000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
4091e58b37221ef13912baba85e2c65d34a8b6eaef8eecaeafe972d1cbe01b38
CVE-2025-54956
The gh package before 1.5.0 for R delivers an HTTP response in a data structure that includes the Authorization header from the corresponding HTTP request.
f6174cbc5f576118bb68d5cf27bbc9ca8cc7720e51730b49dfcc8a2ab3de2669
2025-08-03T18:15:25.873000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
25de3bf3c5c34615d1b26ff80c6409479085a2a9fc63792e963ab7b8adbe5723
CVE-2025-20696
In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09915215; Issue ID: MSV-3801.
f3ac0744196ef581d939309de1cff1b67565c0093dfc0cee1964df29d06e35c6
2025-08-04T02:15:25.940000Z
2025-08-18T15:42:28.783000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
ba4c2c0e22f4d131bc0341d277d7b3979dd0044035ba0ee392d67eb0b2239c83
CVE-2025-20697
In Power HAL, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09915681; Issue ID: MSV-3795.
98e4bb137bd751956aa79f8429468d9980a0e225838b47891ef2345a51d88f61
2025-08-04T02:15:26.863000Z
2025-08-18T15:42:08.480000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
f101a69cdd46c70c7486728eba2908b960d07905989f2d5a18db8593d86df491
CVE-2025-20698
In Power HAL, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09915400; Issue ID: MSV-3793.
a9d1c1ddc3b171f8ba1e9acb2b8f022d6d66ed3a571fbf4cacb00fc264b65cf5
2025-08-04T02:15:27.010000Z
2025-08-18T15:41:58.840000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
00a19e56b7925435d75662ef1308669465d0dc77ad0967e06aa9cc66c53aa107
CVE-2025-54962
/edit-user in webserver in OpenPLC Runtime 3 through 9cd8f1b allows authenticated users to upload arbitrary files (such as .html or .svg), and these are then publicly accessible under the /static URI.
6b0cf0504469ce4184784d067efd79212e26ba84a45c04c7716a52fead8f9b98
2025-08-04T02:15:27.153000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
20803fb8d8cd1b1c169dce496bb024791b819bbd3942e4823a7ab470f9c669d6
CVE-2025-48499
Out-of-bounds write vulnerability exists in FUJIFILM Business Innovation MFPs. A specially crafted IPP (Internet Printing Protocol) or LPD (Line Printer Daemon) packet may cause a denial-of-service (DoS) condition on an affected MFP. Resetting the MFP is required to recover from the denial-of-service (DoS) condition.
824cdb04eb8234ed50e5d1e4c8c28059b54bfc8e70e71a71847fa757c95fc3cf
2025-08-04T06:15:30.377000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
4ec660a3f2f068f10b0d25ecbe5bf4345c664a3d0ff98fdc264e28f3a226861b
CVE-2025-20700
In the Airoha Bluetooth audio SDK, there is a possible permission bypass that allows access critical data of RACE protocol through Bluetooth LE GATT service. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
0a81010ee02ee52f40d8cc4f2a844953f4ff18318ec501a901ebc468be068b05
2025-08-04T07:15:26.740000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
190017814c9c0a9abe8e4873342c104f40b9410ea6c5df98e47216910e01dbab
CVE-2025-20701
In the Airoha Bluetooth audio SDK, there is a possible way to pair Bluetooth audio device without user consent. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
1f7629d42f1e0e2fec740961d3f691fb6454de93bb116d28ba2133a982812fa2
2025-08-04T07:15:28.027000Z
2025-08-04T21:15:29.897000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
99fcc4c5e417de7d7153c6171457ebc18434c7d1d0d114a083cd31d38cd49f2f
CVE-2025-20702
In the Airoha Bluetooth audio SDK, there is a possible unauthorized access to the RACE protocol. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
62764a1a81ae7a12d10a1d16a972f82e55f5330fb8657e04d749def3ab2f9e7d
2025-08-04T07:15:28.190000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
e928bb87e85f462ee468b47c75fc702cf1e452fba6e72347fef139687904705f
CVE-2025-41658
CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions.
733507f654dec89de99d489d7062984bfeb1a182bb93e2808d59148da8b45472
2025-08-04T08:15:47.950000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
949f3d4fe11bb2698d4d4d287363283bee237aec7ac81914bca128b0cb5e921e
CVE-2025-41659
A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted.
e4137346d62bfbc8ae631709b2a0cfe1426663cc1edbb4968a5443f5ad8edf44
2025-08-04T08:15:48.173000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
a0e07da3784e910e90a44c6e5710527d417744466642149f556fd1da247e7b88
CVE-2025-41691
An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted communication requests, potentially leading to a denial-of-service (DoS) condition.
7c2aab9c79e892c3b34af8ed330c2f1dc46f59a5117be6c23191b567ae71f9fc
2025-08-04T08:15:48.353000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
f951b01c5751e34494a74ea7f1208b3f2a36dcd0d800dddf6fa236563d374387
CVE-2025-8341
Grafana is an open-source platform for monitoring and observability. The Infinity datasource plugin, maintained by Grafana Labs, allows visualizing data from JSON, CSV, XML, GraphQL, and HTML endpoints. If the plugin was configured to allow only certain URLs, an attacker could bypass this restriction using a specially crafted URL. This vulnerability is fixed in version 3.4.1.
e57ba2a18e387b87d5a86d157f702aec4234c80b95bdd39a7ae57651950af31f
2025-08-04T09:15:26.103000Z
2025-08-04T15:06:15.833000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
6de4156b01fe56da1f982aacd60adda95222af10fb1e5e454f851a9f4183c521
CVE-2025-0932
Use After Free vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to perform valid GPU processing operations, including via WebGL or WebGPU, to gain access to already freed memory.This issue affects Bifrost GPU Userspace Driver: from r48p0 through r49p3, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r48p0 through r49p3, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Userspace Driver: from r48p0 through r49p3, from r50p0 through r54p0.
725911117f09031a9c2fc090feecde36905d65c40cc3559e0f3be58c83e3bb18
2025-08-04T10:15:27.547000Z
2025-08-05T19:15:31.237000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
d40859c779f4cb543922771861c783c36cc355c68feecd3420ff184241fd3fe3
CVE-2025-6204
An Improper Control of Generation of Code (Code Injection) vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to execute arbitrary code.
1f89efab9497f745122025d9d624e4f25720a2e2a989f334f86a6d6a4fc93290
2025-08-04T10:15:27.800000Z
2025-10-29T12:49:33.617000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
3e613d97aee8d18611d79d7f1a31ed7a6abb67ed177fb9df19ad63e6fcdc89e0
CVE-2025-6205
A missing authorization vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to gain privileged access to the application.
1b45a02514c1eff4ebaef655f37f539906cf766a7b2f8f54c0341ac5fd316c9f
2025-08-04T10:15:28.057000Z
2025-10-29T12:49:53.960000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
d28275c6b01696c40d4220ec9ebaeaebca0d14f9fc53faeed5a934f8667c08c4
CVE-2025-8515
A weakness has been identified in Intelbras InControl 2.21.60.9. This vulnerability affects unknown code of the file /v1/operador/ of the component JSON Endpoint. Executing manipulation can lead to information disclosure. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is stated that the exploitability is difficult. The exploit has been made available to the public and could be exploited. Upgrading the affected component is advised.
48f5dc4b8cc1b6e32e849f61dcf8f279fb7aeee9223e7bbc0b1d7f1de99bc4d8
2025-08-04T11:15:27.647000Z
2025-10-29T07:15:37.913000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
15d34ce547536dea060414c814e2cfa378bb56f02b05ba49183125b1c9bdc4b7
CVE-2025-36604
Dell Unity, version(s) 5.5 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution.
16c13b78f638a93ba62b9022d88622c2021b68ad7ec09e02488b79531ed49f3e
2025-08-04T14:15:32.507000Z
2025-10-03T14:15:45.293000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
a309fb2d795d2fd60bbdf589b20694ea4df5e154c865a04f81499e7692517348
CVE-2025-36605
Dell Unity, version(s) 5.5 and prior, contain(s) an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.
7becb2732be6bb3690c802811550bdfbd0f47b06c3901129dbe112094b316bf7
2025-08-04T14:15:32.703000Z
2025-08-15T16:10:03.957000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
882831aa3b73d942afa521d34ecdd2262a68b93291354b126de18a8c3a490819
CVE-2025-36606
Dell Unity, version(s) 5.5 and prior, contain(s) an OS Command Injection Vulnerability in its svc_nfssupport utility. An authenticated attacker could potentially exploit this vulnerability, escaping the restricted shell and execute arbitrary operating system commands with root privileges.
461a3654d48f14b4349be5b00d0544873dbbdb4b72439dcb9d33a098371e70a0
2025-08-04T14:15:32.850000Z
2025-08-15T16:09:03.087000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
0f3e3ae9c8e664c388824e452e1166a09aaa7cf665cf88a931803e9e6befc25a
CVE-2025-36607
Dell Unity, version(s) 5.5 and prior, contain(s) an OS Command Injection Vulnerability in its svc_nas utility. An authenticated attacker could potentially exploit this vulnerability, escaping the restricted shell and execute arbitrary operating system commands with root privileges.
b2ac9728f304e1f2ed02f2cf64291fd0e65991983636dd28274ad520c98fc89f
2025-08-04T14:15:32.997000Z
2025-08-15T16:08:22.360000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
5061dcf07b437f34a34d26a7845fae0fdd2c8abb0f2e0b8c78ee8bdb21ef68d7
CVE-2025-8109
Software installed and run as a non-privileged user may conduct ptrace system calls to issue writes to GPU origin read only memory.
79bbf23dcb995636c80c054ac4ccfd25956b87485c8cd5a5c045c42fa367af1e
2025-08-04T14:15:33.627000Z
2025-09-08T20:15:36.703000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
81305bb72ca422d09935fb0a3bc24524830f6f16991a2fa6fde3af62e19ffc56
CVE-2025-26065
A cross-site scripting (XSS) vulnerability in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the name of a visiting Wi-Fi network.
95d3a0a76cbd3235801022d8635beb7aa3e0a94cedd0a55b25f79f1f8f1e2717
2025-08-04T15:15:31.067000Z
2025-08-21T00:10:25.563000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
81fc5def0c820edb03076e07a97583b734f8245fe7bebcbbba0efb6e992222a0
CVE-2025-30096
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges.
3905e3ba1dd063eadb0077025f16f5501738930bf31b0116c4fb8baacc8e7542
2025-08-04T15:15:31.397000Z
2025-10-16T14:41:24.990000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
aa680e11e6a8fd47154983770963932256699cce66661319b9fba42d1018f15a
CVE-2025-30097
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges
f693922337dedaa60a046de6769eff2cbd2a787ad88ba95730af799a6d3a6045
2025-08-04T15:15:31.560000Z
2025-10-16T14:41:32.847000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
15731b090f6c396b821cdd4f40e349457bd9c54f062721470024c20db185b81f
CVE-2025-30098
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges.
3905e3ba1dd063eadb0077025f16f5501738930bf31b0116c4fb8baacc8e7542
2025-08-04T15:15:31.723000Z
2025-10-16T14:41:47.683000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
f3cf3723ad92e7d4ed69e51d4c23d9c1bdeaa4a08a01deb0ee2df468626d41b2
CVE-2025-30099
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A low privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges.
49293c829d50da3fc7e69bc58fd966c10133b92839af12dd201d37d7d32f93ed
2025-08-04T15:15:31.887000Z
2025-10-16T14:39:43.847000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
c64d8efe8e0eba260491c14234ae0e98412263fd1b12ebab503f592d7d2c4477
CVE-2025-36594
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Authentication Bypass by Spoofing vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass. Remote unauthenticated user can create account that potentially expose customer info, affect system integrity and availability.
771c943199828d96460cfb05220d5116dc35b7ba871456d5dae62f71009e3685
2025-08-04T15:15:32.040000Z
2025-10-16T14:39:36.873000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
42cb5d7c396121fcf7a36373a9326f8081e23de7bfa6952eeef845508435366c
CVE-2025-44643
Certain Draytek products are affected by Insecure Configuration. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the password property in the ripd.conf configuration file sets a hardcoded weak password, posing a security risk. An attacker with network access could exploit this to gain unauthorized control over the routing daemon, potentially altering network routes or intercepting traffic.
b23e44641dcbb93e7387562c2d94dd87076342a109d8ca534f8e617e8eee3755
2025-08-04T15:15:32.197000Z
2025-08-05T14:34:17.327000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
2ffab83d11b8508a80b4ccd5e770791951cfb8d87e04873c80c48264947528cd
CVE-2025-51536
Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 as discovered to contain a hardcoded Administrator password.
fa7a926448417ff547c9cf664ef2114170586da8c251c1b859fbb8ab626443e8
2025-08-04T15:15:32.410000Z
2025-09-23T19:08:01.787000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
425e04a5df466fd44f0368ff63cc2d54d9ddf72332b16c182be2e6dd8327b551
CVE-2025-38739
Dell Digital Delivery, versions prior to 5.6.1.0, contains an Insufficiently Protected Credentials vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to Information Disclosure.
40269d7c0dffb2647c67176cbb3ac67de96a7de0ace99a730f9116efe6892b48
2025-08-04T16:15:33.080000Z
2025-08-18T15:41:06.843000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
5c7ccf5918a9953872cfea89b69d8b0bd55d57f73193df8c110ea9a18bb8c0f3
CVE-2025-44955
RUCKUS Network Director (RND) before 4.5 allows jailed users to obtain root access vis a weak, hardcoded password.
d341f63509e0291b3ef00a43a9f873e4fd0eef598673c92e5e2b7c540e05ea5d
2025-08-04T16:15:33.417000Z
2025-09-23T19:06:10.853000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
6f9a42a68a30a07b2919465e9de0da009b98e91c9ad4d7c9095112d78d4d0818
CVE-2025-5988
A flaw was found in the Ansible aap-gateway. Cross-site request forgery (CSRF) origin checking is not done on requests from the gateway to external components, such as the controller, hub, and eda.
89763322eb848849b410d86987bc287bafe77d002eb00b7930f455abd15a51f3
2025-08-04T16:15:34.560000Z
2025-08-05T14:34:17.327000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
0a88726d4aaf9d9455f556025eb4df55bee45a135725b65ad546207d64465053
CVE-2025-8516
A vulnerability was found in Kingdee Cloud-Starry-Sky Enterprise Edition up to 8.2. It has been classified as problematic. Affected is the function BaseServiceFactory.getFileUploadService.deleteFileAction of the file K3Cloud\BBCMallSite\WEB-INF\lib\Kingdee.K3.O2O.Base.WebApp.jar!\kingdee\k3\o2o\base\webapp\action\FileUploadAction.class of the component IIS-K3CloudMiniApp. The manipulation of the argument filePath leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor recommends as a short-term measure to "[t]emporarily disable external network access to the Kingdee Cloud Galaxy Retail System or set up an IP whitelist for access control." The long-term remediation will be: "Install the security patch provided by the Starry Sky system, with the specific solutions being: i) Adding authentication to the vulnerable CMKAppWebHandler.ashx interface; ii) Removing the file reading function."
c0530608ed270fbbfcf489d8cc79369306245ffd44a2030ffc79c558715dba26
2025-08-04T16:15:35.373000Z
2025-08-05T14:34:17.327000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
f7eef82ca86c9d9e8036a8442217c43981bbd631f3035cb136d6a784f2f793ba
CVE-2025-8517
A vulnerability was detected in givanz Vvveb 1.0.6.1. Impacted is an unknown function. The manipulation results in session fixiation. The attack can be launched remotely. The exploit is now public and may be used. Upgrading to version 1.0.7 is recommended to address this issue. The patch is identified as d4b1e030066417b77d15b4ac505eed5ae7bf2c5e. You should upgrade the affected component.
fbddba76fe3941992c5c463fa2fbd96949430e556515d30ec3cf31b6b16560bc
2025-08-04T16:15:35.577000Z
2025-08-27T16:23:54.827000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
f34ae563f018354c7077706fea2d9fd934b549799fa24164b69c9a3bc6c1715a
CVE-2025-44954
RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build has a hardcoded SSH private key for a root-equivalent user account.
24804c5baae2dbd0a89a377aa0457720a58fdd4ede988eac37caea1466a65387
2025-08-04T17:15:29.507000Z
2025-08-07T17:55:17.870000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
f26187ce8c54f2cbe815f940b1166e29f295e4664edb99089d628786c9ba4082
CVE-2025-44957
Ruckus SmartZone (SZ) before 6.1.2p3 Refresh Build allows authentication bypass via a valid API key and crafted HTTP headers.
3513738443c661a4024182e9a11d54b2fabf4c72c6f928d8fc4acce9537e879d
2025-08-04T17:15:29.730000Z
2025-08-07T17:59:09.533000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
a3f18ebc515bea518c9a1fc4439b0f32b58f165219a4b90d07da82e08e68a728
CVE-2025-44958
RUCKUS Network Director (RND) before 4.5 stores passwords in a recoverable format.
821163b37a77ef834ddf8c3cb047a7086d0f2932a1896c25b155416007a115b9
2025-08-04T17:15:29.890000Z
2025-09-23T18:57:01.780000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
ba035465c7d4601fcd178de738236750215eae2686409f376522f852bfbe9b2a
CVE-2025-44960
RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build allows OS command injection via a certain parameter in an API route.
09306bc1cdfb52bf5c69930d303354909dcf33420d3743e460c2d0c4dbafa3d3
2025-08-04T17:15:30.050000Z
2025-08-07T17:59:12.387000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
2ba7490b4bdcdf6254e47264cda09148b15cb3dbebf3c2eccb755bf00bc8b688
CVE-2025-44961
In RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build, OS command injection can occur via an IP address field provided by an authenticated user.
6a7873125a465c871b3ba45a45ce7c21b92675680ab0e45871beb4717a722cab
2025-08-04T17:15:30.210000Z
2025-08-07T17:59:15.927000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
4b6c3608c6c9b65d91d999bdcee0c813420115096fc8014b0d3f8a045a05119d
CVE-2025-44962
RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build allows ../ directory traversal to read files.
b5c05d375a348b0e8830ad2eb5e8c3b2e86dab75a23bf575fc3f81dffda5b448
2025-08-04T17:15:30.367000Z
2025-08-07T17:59:20.320000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
4651145fc70fbc0e0d4211d3b4730d5db31408ab70478d4159f4cd880367adcd
CVE-2025-44963
RUCKUS Network Director (RND) before 4.5 allows spoofing of an administrator JWT by an attacker who knows the hardcoded value of a certain secret key.
5f6fd8c260778d550e65eaa1bfb6384166f55d894534ab50610768b0f7f59653
2025-08-04T17:15:30.540000Z
2025-09-23T18:48:59.567000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
3b87e55995b9f1fc051cc73d812a1e96dec718d3975d94773dc61f37573921e9
CVE-2025-50420
An issue in the pdfseparate utility of freedesktop poppler v25.04.0 allows attackers to cause an infinite recursion via supplying a crafted PDF file. This can lead to a Denial of Service (DoS).
2105616df1057258f94964689a0d68924118baa55d2cd3234c7bc2c7eca57e39
2025-08-04T17:15:30.700000Z
2025-10-09T17:43:54.350000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
1b1611476b59921e015950c16fcfd6d102809568e3290563e53d399485653965
CVE-2025-50422
Cairo through 1.18.4, as used in Poppler through 25.08.0, has an "unscaled->face == NULL" assertion failure for _cairo_ft_unscaled_font_fini in cairo-ft-font.c.
7cddf98ee8eb449ec40635a26f6e6206a8afdaae39d0fb86d9f33aa70cc425ff
2025-08-04T17:15:30.813000Z
2025-08-26T19:15:44.387000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
2025-10-29T13:52:01.759408Z
8ec38e3817eeee046c315b565bd1ec79a50d404fdcffab0ba3e163c80d581fec