cve_id
stringlengths 13
15
| summary
stringlengths 15
4k
| description_hash
stringlengths 64
64
| published_date
timestamp[us, tz=UTC]date 2025-07-31 14:15:34
2025-10-29 13:15:34
| modified_date
timestamp[us, tz=UTC]date 2025-07-31 18:42:37
2025-10-29 13:53:20
| is_rejected
bool 2
classes | source
stringclasses 1
value | source_url
stringclasses 7
values | retrieved_at
timestamp[us, tz=UTC]date 2025-10-29 13:52:01
2025-10-29 13:52:01
| source_record_hash
stringlengths 64
64
|
|---|---|---|---|---|---|---|---|---|---|
CVE-2025-8400
|
The Image Gallery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
1c48cd211ec3690451b2bf5fa5623da4d6ddfc432b313ece7d30970b2be2b831
| 2025-08-02T09:15:48.547000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
82f8fd0cba3a600972da244fa95e83e0e7d4d8991b5d08c2564a809b3c442b37
|
CVE-2025-8466
|
A vulnerability was found in code-projects Online Farm System 1.0. It has been classified as critical. Affected is an unknown function of the file /forgot_passfarmer.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
08a10b9136d9f9978dafac06c08533b055506095b069d931fee1a67e6ac776b2
| 2025-08-02T09:15:48.803000Z
| 2025-08-05T18:33:15.147000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
447336ff89170a8428d732f825cf6a80d0c4e2e56ba26f24e6d16d3e97102862
|
CVE-2025-6722
|
The BitFire Security – Firewall, WAF, Bot/Spam Blocker, Login Security plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.5 via the bitfire_* directory that automatically gets created and stores potentially sensitive files without any access restrictions. This makes it possible for unauthenticated attackers to extract sensitive data from various files like config.ini, debug.log, and more when directory listing is enabled on the server and the ~/wp-content/plugins/index.php file is missing or ignored.
|
e6bef484824f420622bc28ab72f21ec9d94e192315ba61d7be2912321fe4a2d4
| 2025-08-02T10:15:25.310000Z
| 2025-08-25T14:15:36.483000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
7165e74ac35da22ff8c3cfe81dc4516c45411114dc08b6fa3669a4929ae01333
|
CVE-2025-8488
|
The Ultimate Addons for Elementor (Formerly Elementor Header & Footer Builder) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_hfe_compatibility_option_callback ()function in all versions up to, and including, 2.4.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the compatibility option setting.
|
5758eeadf175c37998d76ae22215776bfea164b2910dcdb4cc4cc13799fd15f4
| 2025-08-02T10:15:27.477000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
f2d208e2d7c0f4a626f96426a3e46d4fb368830084edaeef57792fd4b23532ad
|
CVE-2025-8467
|
A vulnerability was found in code-projects Wazifa System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /controllers/regcontrol.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
dab77a66347bd6ee88e8c4709d42bf414b84ad34d9f867ba0f662d8c03f9e5fa
| 2025-08-02T11:15:25.450000Z
| 2025-08-05T18:33:02.347000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
716e2ff421f716caf35a2b67ab701c96de9f1097a78e613aee71135203857d3d
|
CVE-2025-7500
|
The Ocean Social Sharing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via social icon titles in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
f8750831170414006344ff42da68dded1e35f771055b7c9cfac666eac3ca3b4b
| 2025-08-02T12:15:28.050000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
bcc3c11344fd86f764fee7ed68380cb7c5401cdc14919efdf4c7e3c313330d7a
|
CVE-2025-7710
|
The Brave Conversion Engine (PRO) plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 0.7.7. This is due to the plugin not properly restricting a claimed identity while authenticating with Facebook. This makes it possible for unauthenticated attackers to log in as other users, including administrators.
|
84f9491f2741e0379f60b227c2279b58796fce3cb69c9289cafd7923be733ade
| 2025-08-02T12:15:28.280000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
24a2fd90af614c316a44cfd6070c2c420a83d492b54e0df2926f4f6fb25bdf10
|
CVE-2025-8468
|
A vulnerability was found in code-projects Wazifa System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /controllers/reset.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
f495128bfc4a296e7e5ff5c1c15ec0817f8e7e9fa3da3586072b337d2f12f6f6
| 2025-08-02T15:15:26.753000Z
| 2025-08-05T18:32:50.010000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
7d3b125ae940732f461fa357adc0e95426e55b512993eac4367bde9ae0be2264
|
CVE-2025-8469
|
A vulnerability classified as critical has been found in SourceCodester Online Hotel Reservation System 1.0. This affects an unknown part of the file /admin/deletegallery.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
cb6d4439dda00c2f761b5e8cae9e41227e3ab5ed39c55f5237dc8ded21a2cf62
| 2025-08-02T17:15:26.477000Z
| 2025-08-05T18:25:50.207000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
80534c85de16730554350862dc3d81da52e0b9d13eb70492acaac939cad763db
|
CVE-2025-8470
|
A vulnerability classified as critical was found in SourceCodester Online Hotel Reservation System 1.0. This vulnerability affects unknown code of the file /admin/deleteroom.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
799a30cf53963b8816c8c03c7e7ec5c70a149ca0684a26ba11e7576d66513ceb
| 2025-08-02T18:15:26.337000Z
| 2025-08-05T18:25:32.497000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
6df0aae139a7847484d9888861fcb1b711715c6b2acf4153d2af3fafca7c610b
|
CVE-2025-8471
|
A vulnerability, which was classified as critical, has been found in projectworlds Online Admission System 1.0. This issue affects some unknown processing of the file /adminlogin.php. The manipulation of the argument a_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
3601459fb3a63b6d54db38aa73195b8b854a461e2eb7293a8006d6e8c9f24b89
| 2025-08-02T19:15:25.460000Z
| 2025-08-05T18:25:08.913000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
355f83577e52e5805dd50fe683eb540991d69d35fcb39946f1f2618bdc78a86e
|
CVE-2025-23276
|
NVIDIA Installer for Windows contains a vulnerability where an attacker may be able to escalate privileges. A successful exploit of this vulnerability may lead to escalation of privileges, denial of service, code execution, information disclosure and data tampering.
|
e295d3cc967eac390b5bdad57fcdf65e4a320d222ada38ca0b79dc12d083838e
| 2025-08-02T22:15:44.290000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
c20ebc3a986f0e9a70b0f44eb7fbf42c83304baaa50c07a0d941f6f8d1415b79
|
CVE-2025-23277
|
NVIDIA Display Driver for Linux and Windows contains a vulnerability in the kernel mode driver, where an attacker could access memory outside bounds permitted under normal use cases. A successful exploit of this vulnerability might lead to denial of service, data tampering, or information disclosure.
|
8220107f6e378db3deff36ec2ea306f22caab1fc1be61d1b79b2052d56151d7d
| 2025-08-02T22:15:44.487000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
375c1807ec586d4aa6a5268be944f90ede88cb81da6bc17d2e185a42c8ed7547
|
CVE-2025-23278
|
NVIDIA Display Driver for Windows and Linux contains a vulnerability where an attacker might cause an improper index validation by issuing a call with crafted parameters. A successful exploit of this vulnerability might lead to data tampering or denial of service.
|
db61b38a2848bad48583a401513305576e9874d48872348d0db3dcd2418098f3
| 2025-08-02T22:15:44.657000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
1cb1d58d77b7aaee8e95a077603d6d2b2c64c569de3228c8c4730790b0b42a6d
|
CVE-2025-23279
|
NVIDIA .run Installer for Linux and Solaris contains a vulnerability where an attacker could use a race condition to escalate privileges. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, denial of service, or data tampering.
|
188db4bbc9112e9661fd95ab6c067c11bea3fd2bb408049547dc82e7835f2729
| 2025-08-02T22:15:44.830000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
3921e02407df6030a8ea5331697516755784ee247956da3b3d4a41cfe625de2d
|
CVE-2025-23281
|
NVIDIA GPU Display Driver for Windows contains a vulnerability where an attacker with local unprivileged access that can win a race condition might be able to trigger a use-after-free error. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.
|
820a33b846b864b1e64a66bc4de62854da1c67e54264cca149f812cc08140402
| 2025-08-02T22:15:44.993000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
07b0f273daea7c2047f9eae7d55e050b36151b1bdb92f43dc7a505e94e1ddb72
|
CVE-2025-23283
|
NVIDIA vGPU software for Linux-style hypervisors contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause stack buffer overflow. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
|
123514eafd0e6780e98fecdd25db75b6b8cc71699884570e663e8282af429a4f
| 2025-08-02T22:15:45.160000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
3df28c448b149031bb7bf1c6e917194dd358908d5aa0477d2542fa3373216898
|
CVE-2025-23286
|
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where an attacker could read invalid memory. A successful exploit of this vulnerability might lead to information disclosure.
|
04be22ed55a7d8e727c477d510bdcad7964dfc6dc2d8f6c6010d7c128b1aa311
| 2025-08-02T22:15:45.327000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
cf961e58645efcc0eccd758b73978c75572566d283d8ea4f4485031c6600959c
|
CVE-2025-23287
|
NVIDIA GPU Display Driver for Windows contains a vulnerability where an attacker may access sensitive system-level information. A successful exploit of this vulnerability may lead to Information disclosure.
|
9a25df1278682b7188fc621ae9b66253884aa63c2e711b0d8d36f1882175a3d2
| 2025-08-02T22:15:45.493000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
64458b5eff69bde583e34e22bc6b335f4c96f68006819f7480b817d7b5c72777
|
CVE-2025-23288
|
NVIDIA GPU Display Driver for Windows contains a vulnerability where an attacker may cause an exposure of sensitive system information with local unprivileged system access. A successful exploit of this vulnerability may lead to Information disclosure.
|
0bdb8180f48f2c3777ec08c514a52c213b636e5f372d42ce438971f8e5d416a3
| 2025-08-02T22:15:45.660000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
282246b6e5c17da4dd9a77f9a478ee836dcba149703c65d2c7c0bd7ad91d277e
|
CVE-2023-32253
|
A flaw was found in the Linux kernel's ksmbd component. A deadlock is triggered by sending multiple concurrent session setup requests, possibly leading to a denial of service.
|
cd0b8d30cb624aafb000d0186170c8e5bc8f5631f211f4013c0fcc37d9ae7a44
| 2025-08-02T23:15:24.770000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
b678b480f29525cc785c5a4e0790945b5d7221941c78c083982f5e7f37abe83a
|
CVE-2023-32255
|
A flaw was found in the Linux kernel's ksmbd component. A memory leak can occur if a client sends a session setup request with an unknown NTLMSSP message type, potentially leading to resource exhaustion.
|
fa7dd94b6dc0d568981962df1910381a45f2acbb2c179a237745a243335c24f2
| 2025-08-02T23:15:25.820000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
4b34e230a799251ee68a9a174e7984262e47ddeb5607974fec015e8393f097bf
|
CVE-2025-23284
|
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause a stack buffer overflow. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, or data tampering.
|
be28e634675fe9072d0535ab81ce2ec272b92e54e49530bb440e95b0536aa1d4
| 2025-08-02T23:15:26.377000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
4164809aad1a6395a46db6366828fe9ceed5c004f680083d3358ad719bf5ae73
|
CVE-2025-23285
|
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where it allows a guest to access global resources. A successful exploit of this vulnerability might lead to denial of service.
|
d92e667396b43275b8d1753230adf620082d4ebcdcbce47e9ba9d89311df6260
| 2025-08-02T23:15:26.617000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
4ec3a23ac1a343c2e6ef36e17ed9f89b47a2563a9d935b3a0649033278bd4843
|
CVE-2025-23290
|
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a guest could get global GPU metrics which may be influenced by work in other VMs. A successful exploit of this vulnerability might lead to information disclosure.
|
59c3e8c8cd91b1ad3ea0c259f8d1e16fe374a6446a493f3fb67a72f1d278e8e2
| 2025-08-02T23:15:26.780000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
5de16381e51ccfcad2f874f72d932eb60c3e4f3605c7cb75ef9d38bb1c3ed05e
|
CVE-2025-8493
|
A vulnerability classified as critical was found in code-projects Intern Membership Management System 1.0. This vulnerability affects unknown code of the file /admin/edit_student_query.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
bb84d3492d0fe4fb3399ea163d961723f8b348c992484af899896bc08dcf6cfc
| 2025-08-02T23:15:26.943000Z
| 2025-08-05T18:22:55.830000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
312d91f5bd6346d402372b1ee5c063c133551f10280cdda65e3630605f6105df
|
CVE-2025-54955
|
OpenNebula Community Edition (CE) before 7.0.0 and Enterprise Edition (EE) before 6.10.3 have a critical FireEdge race condition that can lead to full account takeover. By exploiting this, an unauthenticated attacker can obtain a valid JSON Web Token (JWT) belonging to a legitimate user without knowledge of their credentials.
|
d9352f655aa14fd310c82815ba300f9fd0846dde4c8eca177d8292736547328b
| 2025-08-03T00:15:25.633000Z
| 2025-08-04T16:15:34.340000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
3b9a592e8a3244556198973c57d1573b759c352ebc6269b9daeb869100573b9c
|
CVE-2025-8494
|
A vulnerability, which was classified as critical, has been found in code-projects Intern Membership Management System 1.0. This issue affects some unknown processing of the file /admin/delete_student.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
5b25f3dbfb91c2e27588f445d14887880ab2a2d9e6e2b036cd7251e89f5bf2a3
| 2025-08-03T00:15:25.850000Z
| 2025-08-05T18:43:56.300000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
85e6c2268e42c3265c3c34bdd7046990bfa473724ff6dbcc6e839dcf358f5a2b
|
CVE-2025-54349
|
In iperf before 3.19.1, iperf_auth.c has an off-by-one error and resultant heap-based buffer overflow.
|
5ddd0ce5c7ccb08db63440ec733a8b832f6e590de0b179db1f1281cdc19cd706
| 2025-08-03T02:15:35.597000Z
| 2025-10-17T19:46:28.300000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
96762a6fad8a9f90a204d7a53008202c160173772b8451547709de1b935765f7
|
CVE-2025-54350
|
In iperf before 3.19.1, iperf_auth.c has a Base64Decode assertion failure and application exit upon a malformed authentication attempt.
|
b27166b499031d9558f075c132f05b061badc5dea2af0b9400e6b018ca0f0cf1
| 2025-08-03T02:15:37.193000Z
| 2025-10-17T19:59:44.643000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
46eb9da5cbc5f11500c9132c146de2ba4f44637029891b046d02ad2e1c7e7a22
|
CVE-2025-54351
|
In iperf before 3.19.1, net.c has a buffer overflow when --skip-rx-copy is used (for MSG_TRUNC in recv).
|
f71a132195cb31d5eebc01a548dc6b65183f50ef9d2e47fbb565774580632198
| 2025-08-03T02:15:37.380000Z
| 2025-10-17T19:59:58.313000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
82c2529cfa986f1440113d28fcd10af582578373e0415b96fdda858bdb04e348
|
CVE-2025-8495
|
A vulnerability, which was classified as critical, was found in code-projects Intern Membership Management System 1.0. Affected is an unknown function of the file /admin/edit_admin_query.php. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
fa1377010550d64f4bdc2ef366eb18f5bb15166334bb497cf2d9fb993073f270
| 2025-08-03T02:15:37.560000Z
| 2025-08-08T16:22:47.703000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
0cf2148427a15dc65f7770953c574746068ba9fe49bb07a9bbd947bd0510a87a
|
CVE-2025-52131
|
The Mocca Calendar application before 2.15 for XWiki allows XSS via the background or text color field.
|
7222d0a522beafd949cabd422293d413c80a9a418f0fbd2db0d9272547e35a37
| 2025-08-03T04:15:37.940000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
f514bf4aa8596c896febd441f779df4120e2620d0a333e6a09b928fad0986e5a
|
CVE-2025-52132
|
The Mocca Calendar application before 2.15 for XWiki allows XSS via a title to the view event page.
|
954e1fac617a70f1284496c18ad4d247ed02f91007ec973f3e0563dffa237359
| 2025-08-03T04:15:46.263000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
5b7258fcc0a987d409702b645980ff6c26c1fbb0d5f3093cb4cb91cba50a76ff
|
CVE-2025-52133
|
The Mocca Calendar application before 2.15 for XWiki allows XSS via a title upon calendar import.
|
8dea63c3123f08a2da39a62f2853a006b409c78cceed1bcff4d56a8d5bafb368
| 2025-08-03T04:15:47.167000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
94f6a1368b9b6903a2eb4e1b03151aa5f912aee76cbc1342da5620d0d9914e0b
|
CVE-2025-8496
|
A vulnerability has been found in projectworlds Online Admission System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /viewform.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
f31abf3317f4294590240a0af78d631d5af7fd3db247a07dd2a6a85c08056386
| 2025-08-03T04:15:49.543000Z
| 2025-08-08T16:23:06.237000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
06bbe87ebafbf8e2a22e677dd6ad7de340f8ba9f37ea4532c7914502371f1da0
|
CVE-2025-8497
|
A weakness has been identified in code-projects Online Medicine Guide 1.0. This affects an unknown part of the file /cusfindphar2.php. This manipulation of the argument Search causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
|
57d45e54cf1ecb917311c0aed988ca0466e604d826a07a8e1276ab0b2505a987
| 2025-08-03T04:15:51.867000Z
| 2025-09-29T21:27:58.667000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
2883677326f0406579b54e6531d4ec99182c7eb66fdc2fd2916c1bbd8365b5a7
|
CVE-2025-8498
|
A security vulnerability has been detected in code-projects Online Medicine Guide 1.0. This vulnerability affects unknown code of the file /cart/index.php. Such manipulation of the argument uname leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
|
23b64da5bbe221b8c3a1a6da7ea713da33b1eb6ffbb2f4c0b59b098916af1b98
| 2025-08-03T04:15:53.443000Z
| 2025-09-29T21:28:28.823000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
10ddf38f1433b3ac890c097579e1851abcec8e3a36c58a1f7d0330d9f4aafd99
|
CVE-2025-8499
|
A vulnerability was found in code-projects Online Medicine Guide 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /cusfindambulence2.php. The manipulation of the argument Search leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
b8521eee6bf7a899859b4daa066daac20fdb52faab79211855a8b202e1b32219
| 2025-08-03T05:15:25.713000Z
| 2025-08-05T14:45:23.793000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
07975ed1408edd53e1ec31ba046e72c97047d2d61c324f007b498858dab3cf5e
|
CVE-2025-8500
|
A vulnerability was found in code-projects Human Resource Integrated System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /insert-and-view/action.php. The manipulation of the argument content leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
e12ebf852dbc8ccda4d7e29708601f0ae5db833f0361415a192ef36fce1ec451
| 2025-08-03T05:15:25.963000Z
| 2025-10-23T20:06:00.793000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
1cee360acd5e29e6aca7f29975d85e85ba26eabd65543e88a1167f194bcc299f
|
CVE-2025-8501
|
A vulnerability classified as problematic has been found in code-projects Human Resource Integrated System 1.0. Affected is an unknown function of the file /insert-and-view/action.php. The manipulation of the argument content leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
8df1a1884d041156bfcf5c280f23262039d20dd25b319229bd842291d49d77cf
| 2025-08-03T06:15:31.617000Z
| 2025-10-23T20:06:00.793000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
2b28f328fbfed7494e50e8b04990419a380e2c978c66f0ee8ff27826a672e437
|
CVE-2025-8502
|
A vulnerability classified as critical was found in code-projects Online Medicine Guide 1.0. Affected by this vulnerability is an unknown functionality of the file /changepass.php. The manipulation of the argument ups leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
b40ea864fe5be6e21b91cef8b7f14c8370fbc0ce9e189a3336cae4ef50f65223
| 2025-08-03T07:15:24.200000Z
| 2025-08-05T14:45:04.403000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
fd9b87ba55d0d96af5ad0ef31061e2c77efad0481d70c5dd7060072795c3da24
|
CVE-2025-8503
|
A vulnerability, which was classified as critical, has been found in code-projects Online Medicine Guide 1.0. Affected by this issue is some unknown functionality of the file /adaddmed.php. The manipulation of the argument mname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
18d908c34ade4cc8518d59b5478de0b1dcf42121bf0246788c2820a0457033a6
| 2025-08-03T07:15:25.467000Z
| 2025-08-05T14:43:25.300000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
2036afe2146738d80787bf7ebbb9b6b391042bad005a6a2eb8d15d1b77f18370
|
CVE-2025-8504
|
A vulnerability, which was classified as critical, was found in code-projects Kitchen Treasure 1.0. This affects an unknown part of the file /userregistration.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
560056e12547e69efa96ca7a3fef988ddeabed056f16f6b4effd1f8712af15b1
| 2025-08-03T08:15:24.290000Z
| 2025-08-08T16:23:15.553000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
48df21b1b8aa811eddfcf5b6c98a4cdcd303706563064fd6b8abf5d70ca62330
|
CVE-2025-8505
|
A vulnerability has been found in 495300897 wx-shop up to de1b66331368695779cfc6e4d11a64caddf8716e and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
|
aab1ae573b9b21f1d18b264d5988d7d5e250b6e438f2897426be87bc8fa588fa
| 2025-08-03T08:15:25.210000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
1f364c9f684fc88894c7c3974de7d711d425b14a0205bb2c25f79673a37b13ab
|
CVE-2025-8506
|
A vulnerability was found in 495300897 wx-shop up to de1b66331368695779cfc6e4d11a64caddf8716e and classified as problematic. This issue affects some unknown processing of the file /user/editUI. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
|
f898f8d065e849af273c053bf7d0cd792535e965823983c2eb55a4b0e3978500
| 2025-08-03T09:15:29.130000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
388f68368c650372efd7fc7f7a7d8a28ba219333dc0d5ce94f5d2882165d3167
|
CVE-2024-41177
|
Incomplete Blacklist to Cross-Site Scripting vulnerability in Apache Zeppelin.
This issue affects Apache Zeppelin: before 0.12.0.
Users are recommended to upgrade to version 0.12.0, which fixes the issue.
|
01ab57ae65ede3c7afa4e7d8f2aa0e8f95db952d5a9ae6191b9ef7796cf0d7c6
| 2025-08-03T10:15:27.240000Z
| 2025-08-05T16:35:15.320000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
cd5611c34714cb885bf797316cce8d263a7777b8a1d17f6a3a4a1baf7830ccfb
|
CVE-2024-52279
|
Improper Input Validation vulnerability in Apache Zeppelin. The fix for JDBC URL validation in CVE-2024-31864 did not account for URL encoded input.
This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0.
Users are recommended to upgrade to version 0.12.0, which fixes the issue.
|
3b95eaeb5b5a2932881872af8e2b717c7dc8aea9a56d46b8a52007caa3eea779
| 2025-08-03T10:15:27.517000Z
| 2025-08-05T18:44:32.057000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
d35ec7073b70192e24b217703b011428ffa7983fee46d8d37c80cf3a252737db
|
CVE-2025-8507
|
A vulnerability was found in Portabilis i-Educar 2.9. It has been classified as problematic. Affected is an unknown function of the file /intranet/educar_funcao_lst.php. The manipulation of the argument nm_funcao/abreviatura leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
fb2dc09ac74565aef0d1c5e020d30ffffa79498bd0ff8d39408a6aeca21e5aa9
| 2025-08-03T10:15:27.690000Z
| 2025-08-12T17:47:42.587000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
f3e818118fb0d120febddc13786da038066ff3813f91d4f066c2e450fc08781a
|
CVE-2024-51775
|
Missing Origin Validation in WebSockets vulnerability in Apache Zeppelin.
The attacker could access the Zeppelin server from another origin without any restriction, and get internal information about paragraphs.
This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0.
Users are recommended to upgrade to version 0.12.0, which fixes the issue.
|
5b045714a1b98e07445683bb302d0590bb6bc42b35fd4f946ddaece41cdaea12
| 2025-08-03T11:15:26Z
| 2025-08-05T16:15:28.490000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
11492ff5b86b68329e8e8dbf0645e202c48001faedac50722b13c254de85e51d
|
CVE-2025-8508
|
A vulnerability was found in Portabilis i-Educar 2.9. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /intranet/educar_avaliacao_desempenho_cad.php. The manipulation of the argument titulo_avaliacao/descricao leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
856b93b51938509345354c02057fed9b6d17c5eb96cf6e069c0ce99e4dbbdf58
| 2025-08-03T11:15:26.167000Z
| 2025-08-12T17:47:33.960000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
03a3d8fea2e42004a8b24a79ff071145243ffb4f4d6fef4b18857c8dcfde073b
|
CVE-2025-8509
|
A vulnerability was found in Portabilis i-Educar 2.9. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /intranet/educar_servidor_cad.php. The manipulation of the argument matricula leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
89148c8f5961fe31ddc3c0d2e12a6e4185844b72c6006711094f58a57fb783e6
| 2025-08-03T13:15:25.597000Z
| 2025-08-12T17:47:26.697000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
f5c920a4a618d8a5556931d4987ebf796244f59f08f8f939c64d30eba685a5dd
|
CVE-2025-8510
|
A vulnerability classified as problematic has been found in Portabilis i-Educar 2.10. This affects the function Gerar of the file ieducar/intranet/educar_matricula_lst.php. The manipulation of the argument ref_cod_aluno leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 82c288b9a4abb084bdfa1c0c4ef777ed45f98b46. It is recommended to apply a patch to fix this issue. The vendor initially closed the original advisory without requesting a CVE.
|
5397c32d3ee0ba7ba226fb0a54affaa604a2076cdfec5ae23688ad511995fd6e
| 2025-08-03T13:15:26.300000Z
| 2025-08-12T17:47:11.327000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
88744505e81fd383a2f759d6fd508df2d3beff843cfcdbac8424757f399da8f4
|
CVE-2025-8511
|
A vulnerability classified as problematic was found in Portabilis i-Diario 1.5.0. This vulnerability affects unknown code of the file /diario-de-observacoes/ of the component Observações. The manipulation of the argument Descrição leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
5b1bafdd9d5d859ccb8f28ad07c4c3d1c34ed50f5a3f12f441ec023a9fd07b5d
| 2025-08-03T14:15:26.010000Z
| 2025-09-11T14:36:04.480000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
8b71d860b5b23983728579dd5a62b3e47f2116edf4537e21f1398c277d559f24
|
CVE-2025-8512
|
A vulnerability, which was classified as problematic, has been found in TVB Big Big Shop App 2.9.0 on Android. This issue affects some unknown processing of the file AndroidManifest.xml of the component hk.com.tvb.bigbigshop. The manipulation leads to improper export of android application components. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
50aa7085c2f3640eca66fb893f4a6d48672d3290b807ec49600083537661c157
| 2025-08-03T14:15:26.737000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
2ab56a71735d52d75fef0642352e2379256642e8d5835ee98ba842b1847d884e
|
CVE-2025-8513
|
A vulnerability, which was classified as problematic, was found in Caixin News App 8.0.1 on Android. Affected is an unknown function of the file AndroidManifest.xml of the component com.caixin.news. The manipulation leads to improper export of android application components. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
4117d30c500476caad1152dbb21b4abab64de8c4a5185d0c96e1ec4b2bb1fd15
| 2025-08-03T15:15:38.920000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
4091e58b37221ef13912baba85e2c65d34a8b6eaef8eecaeafe972d1cbe01b38
|
CVE-2025-54956
|
The gh package before 1.5.0 for R delivers an HTTP response in a data structure that includes the Authorization header from the corresponding HTTP request.
|
f6174cbc5f576118bb68d5cf27bbc9ca8cc7720e51730b49dfcc8a2ab3de2669
| 2025-08-03T18:15:25.873000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
25de3bf3c5c34615d1b26ff80c6409479085a2a9fc63792e963ab7b8adbe5723
|
CVE-2025-20696
|
In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09915215; Issue ID: MSV-3801.
|
f3ac0744196ef581d939309de1cff1b67565c0093dfc0cee1964df29d06e35c6
| 2025-08-04T02:15:25.940000Z
| 2025-08-18T15:42:28.783000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
ba4c2c0e22f4d131bc0341d277d7b3979dd0044035ba0ee392d67eb0b2239c83
|
CVE-2025-20697
|
In Power HAL, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09915681; Issue ID: MSV-3795.
|
98e4bb137bd751956aa79f8429468d9980a0e225838b47891ef2345a51d88f61
| 2025-08-04T02:15:26.863000Z
| 2025-08-18T15:42:08.480000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
f101a69cdd46c70c7486728eba2908b960d07905989f2d5a18db8593d86df491
|
CVE-2025-20698
|
In Power HAL, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09915400; Issue ID: MSV-3793.
|
a9d1c1ddc3b171f8ba1e9acb2b8f022d6d66ed3a571fbf4cacb00fc264b65cf5
| 2025-08-04T02:15:27.010000Z
| 2025-08-18T15:41:58.840000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
00a19e56b7925435d75662ef1308669465d0dc77ad0967e06aa9cc66c53aa107
|
CVE-2025-54962
|
/edit-user in webserver in OpenPLC Runtime 3 through 9cd8f1b allows authenticated users to upload arbitrary files (such as .html or .svg), and these are then publicly accessible under the /static URI.
|
6b0cf0504469ce4184784d067efd79212e26ba84a45c04c7716a52fead8f9b98
| 2025-08-04T02:15:27.153000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
20803fb8d8cd1b1c169dce496bb024791b819bbd3942e4823a7ab470f9c669d6
|
CVE-2025-48499
|
Out-of-bounds write vulnerability exists in FUJIFILM Business Innovation MFPs. A specially crafted IPP (Internet Printing Protocol) or LPD (Line Printer Daemon) packet may cause a denial-of-service (DoS) condition on an affected MFP. Resetting the MFP is required to recover from the denial-of-service (DoS) condition.
|
824cdb04eb8234ed50e5d1e4c8c28059b54bfc8e70e71a71847fa757c95fc3cf
| 2025-08-04T06:15:30.377000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
4ec660a3f2f068f10b0d25ecbe5bf4345c664a3d0ff98fdc264e28f3a226861b
|
CVE-2025-20700
|
In the Airoha Bluetooth audio SDK, there is a possible permission bypass that allows access critical data of RACE protocol through Bluetooth LE GATT service. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
0a81010ee02ee52f40d8cc4f2a844953f4ff18318ec501a901ebc468be068b05
| 2025-08-04T07:15:26.740000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
190017814c9c0a9abe8e4873342c104f40b9410ea6c5df98e47216910e01dbab
|
CVE-2025-20701
|
In the Airoha Bluetooth audio SDK, there is a possible way to pair Bluetooth audio device without user consent. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
1f7629d42f1e0e2fec740961d3f691fb6454de93bb116d28ba2133a982812fa2
| 2025-08-04T07:15:28.027000Z
| 2025-08-04T21:15:29.897000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
99fcc4c5e417de7d7153c6171457ebc18434c7d1d0d114a083cd31d38cd49f2f
|
CVE-2025-20702
|
In the Airoha Bluetooth audio SDK, there is a possible unauthorized access to the RACE protocol. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
62764a1a81ae7a12d10a1d16a972f82e55f5330fb8657e04d749def3ab2f9e7d
| 2025-08-04T07:15:28.190000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
e928bb87e85f462ee468b47c75fc702cf1e452fba6e72347fef139687904705f
|
CVE-2025-41658
|
CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions.
|
733507f654dec89de99d489d7062984bfeb1a182bb93e2808d59148da8b45472
| 2025-08-04T08:15:47.950000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
949f3d4fe11bb2698d4d4d287363283bee237aec7ac81914bca128b0cb5e921e
|
CVE-2025-41659
|
A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted.
|
e4137346d62bfbc8ae631709b2a0cfe1426663cc1edbb4968a5443f5ad8edf44
| 2025-08-04T08:15:48.173000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
a0e07da3784e910e90a44c6e5710527d417744466642149f556fd1da247e7b88
|
CVE-2025-41691
|
An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted communication requests, potentially leading to a denial-of-service (DoS) condition.
|
7c2aab9c79e892c3b34af8ed330c2f1dc46f59a5117be6c23191b567ae71f9fc
| 2025-08-04T08:15:48.353000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
f951b01c5751e34494a74ea7f1208b3f2a36dcd0d800dddf6fa236563d374387
|
CVE-2025-8341
|
Grafana is an open-source platform for monitoring and observability. The Infinity datasource plugin, maintained by Grafana Labs, allows visualizing data from JSON, CSV, XML, GraphQL, and HTML endpoints.
If the plugin was configured to allow only certain URLs, an attacker could bypass this restriction using a specially crafted URL. This vulnerability is fixed in version 3.4.1.
|
e57ba2a18e387b87d5a86d157f702aec4234c80b95bdd39a7ae57651950af31f
| 2025-08-04T09:15:26.103000Z
| 2025-08-04T15:06:15.833000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
6de4156b01fe56da1f982aacd60adda95222af10fb1e5e454f851a9f4183c521
|
CVE-2025-0932
|
Use After Free vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to perform valid GPU processing operations, including via WebGL or WebGPU, to gain access to already freed memory.This issue affects Bifrost GPU Userspace Driver: from r48p0 through r49p3, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r48p0 through r49p3, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Userspace Driver: from r48p0 through r49p3, from r50p0 through r54p0.
|
725911117f09031a9c2fc090feecde36905d65c40cc3559e0f3be58c83e3bb18
| 2025-08-04T10:15:27.547000Z
| 2025-08-05T19:15:31.237000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
d40859c779f4cb543922771861c783c36cc355c68feecd3420ff184241fd3fe3
|
CVE-2025-6204
|
An Improper Control of Generation of Code (Code Injection) vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to execute arbitrary code.
|
1f89efab9497f745122025d9d624e4f25720a2e2a989f334f86a6d6a4fc93290
| 2025-08-04T10:15:27.800000Z
| 2025-10-29T12:49:33.617000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
3e613d97aee8d18611d79d7f1a31ed7a6abb67ed177fb9df19ad63e6fcdc89e0
|
CVE-2025-6205
|
A missing authorization vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to gain privileged access to the application.
|
1b45a02514c1eff4ebaef655f37f539906cf766a7b2f8f54c0341ac5fd316c9f
| 2025-08-04T10:15:28.057000Z
| 2025-10-29T12:49:53.960000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
d28275c6b01696c40d4220ec9ebaeaebca0d14f9fc53faeed5a934f8667c08c4
|
CVE-2025-8515
|
A weakness has been identified in Intelbras InControl 2.21.60.9. This vulnerability affects unknown code of the file /v1/operador/ of the component JSON Endpoint. Executing manipulation can lead to information disclosure. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is stated that the exploitability is difficult. The exploit has been made available to the public and could be exploited. Upgrading the affected component is advised.
|
48f5dc4b8cc1b6e32e849f61dcf8f279fb7aeee9223e7bbc0b1d7f1de99bc4d8
| 2025-08-04T11:15:27.647000Z
| 2025-10-29T07:15:37.913000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
15d34ce547536dea060414c814e2cfa378bb56f02b05ba49183125b1c9bdc4b7
|
CVE-2025-36604
|
Dell Unity, version(s) 5.5 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution.
|
16c13b78f638a93ba62b9022d88622c2021b68ad7ec09e02488b79531ed49f3e
| 2025-08-04T14:15:32.507000Z
| 2025-10-03T14:15:45.293000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
a309fb2d795d2fd60bbdf589b20694ea4df5e154c865a04f81499e7692517348
|
CVE-2025-36605
|
Dell Unity, version(s) 5.5 and prior, contain(s) an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.
|
7becb2732be6bb3690c802811550bdfbd0f47b06c3901129dbe112094b316bf7
| 2025-08-04T14:15:32.703000Z
| 2025-08-15T16:10:03.957000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
882831aa3b73d942afa521d34ecdd2262a68b93291354b126de18a8c3a490819
|
CVE-2025-36606
|
Dell Unity, version(s) 5.5 and prior, contain(s) an OS Command Injection Vulnerability in its svc_nfssupport utility. An authenticated attacker could potentially exploit this vulnerability, escaping the restricted shell and execute arbitrary operating system commands with root privileges.
|
461a3654d48f14b4349be5b00d0544873dbbdb4b72439dcb9d33a098371e70a0
| 2025-08-04T14:15:32.850000Z
| 2025-08-15T16:09:03.087000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
0f3e3ae9c8e664c388824e452e1166a09aaa7cf665cf88a931803e9e6befc25a
|
CVE-2025-36607
|
Dell Unity, version(s) 5.5 and prior, contain(s) an OS Command Injection Vulnerability in its svc_nas utility. An authenticated attacker could potentially exploit this vulnerability, escaping the restricted shell and execute arbitrary operating system commands with root privileges.
|
b2ac9728f304e1f2ed02f2cf64291fd0e65991983636dd28274ad520c98fc89f
| 2025-08-04T14:15:32.997000Z
| 2025-08-15T16:08:22.360000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
5061dcf07b437f34a34d26a7845fae0fdd2c8abb0f2e0b8c78ee8bdb21ef68d7
|
CVE-2025-8109
|
Software installed and run as a non-privileged user may conduct ptrace system calls to issue writes to GPU origin read only memory.
|
79bbf23dcb995636c80c054ac4ccfd25956b87485c8cd5a5c045c42fa367af1e
| 2025-08-04T14:15:33.627000Z
| 2025-09-08T20:15:36.703000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
81305bb72ca422d09935fb0a3bc24524830f6f16991a2fa6fde3af62e19ffc56
|
CVE-2025-26065
|
A cross-site scripting (XSS) vulnerability in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the name of a visiting Wi-Fi network.
|
95d3a0a76cbd3235801022d8635beb7aa3e0a94cedd0a55b25f79f1f8f1e2717
| 2025-08-04T15:15:31.067000Z
| 2025-08-21T00:10:25.563000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
81fc5def0c820edb03076e07a97583b734f8245fe7bebcbbba0efb6e992222a0
|
CVE-2025-30096
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges.
|
3905e3ba1dd063eadb0077025f16f5501738930bf31b0116c4fb8baacc8e7542
| 2025-08-04T15:15:31.397000Z
| 2025-10-16T14:41:24.990000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
aa680e11e6a8fd47154983770963932256699cce66661319b9fba42d1018f15a
|
CVE-2025-30097
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges
|
f693922337dedaa60a046de6769eff2cbd2a787ad88ba95730af799a6d3a6045
| 2025-08-04T15:15:31.560000Z
| 2025-10-16T14:41:32.847000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
15731b090f6c396b821cdd4f40e349457bd9c54f062721470024c20db185b81f
|
CVE-2025-30098
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges.
|
3905e3ba1dd063eadb0077025f16f5501738930bf31b0116c4fb8baacc8e7542
| 2025-08-04T15:15:31.723000Z
| 2025-10-16T14:41:47.683000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
f3cf3723ad92e7d4ed69e51d4c23d9c1bdeaa4a08a01deb0ee2df468626d41b2
|
CVE-2025-30099
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A low privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges.
|
49293c829d50da3fc7e69bc58fd966c10133b92839af12dd201d37d7d32f93ed
| 2025-08-04T15:15:31.887000Z
| 2025-10-16T14:39:43.847000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
c64d8efe8e0eba260491c14234ae0e98412263fd1b12ebab503f592d7d2c4477
|
CVE-2025-36594
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Authentication Bypass by Spoofing vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass. Remote unauthenticated user can create account that potentially expose customer info, affect system integrity and availability.
|
771c943199828d96460cfb05220d5116dc35b7ba871456d5dae62f71009e3685
| 2025-08-04T15:15:32.040000Z
| 2025-10-16T14:39:36.873000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
42cb5d7c396121fcf7a36373a9326f8081e23de7bfa6952eeef845508435366c
|
CVE-2025-44643
|
Certain Draytek products are affected by Insecure Configuration. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the password property in the ripd.conf configuration file sets a hardcoded weak password, posing a security risk. An attacker with network access could exploit this to gain unauthorized control over the routing daemon, potentially altering network routes or intercepting traffic.
|
b23e44641dcbb93e7387562c2d94dd87076342a109d8ca534f8e617e8eee3755
| 2025-08-04T15:15:32.197000Z
| 2025-08-05T14:34:17.327000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
2ffab83d11b8508a80b4ccd5e770791951cfb8d87e04873c80c48264947528cd
|
CVE-2025-51536
|
Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 as discovered to contain a hardcoded Administrator password.
|
fa7a926448417ff547c9cf664ef2114170586da8c251c1b859fbb8ab626443e8
| 2025-08-04T15:15:32.410000Z
| 2025-09-23T19:08:01.787000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
425e04a5df466fd44f0368ff63cc2d54d9ddf72332b16c182be2e6dd8327b551
|
CVE-2025-38739
|
Dell Digital Delivery, versions prior to 5.6.1.0, contains an Insufficiently Protected Credentials vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to Information Disclosure.
|
40269d7c0dffb2647c67176cbb3ac67de96a7de0ace99a730f9116efe6892b48
| 2025-08-04T16:15:33.080000Z
| 2025-08-18T15:41:06.843000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
5c7ccf5918a9953872cfea89b69d8b0bd55d57f73193df8c110ea9a18bb8c0f3
|
CVE-2025-44955
|
RUCKUS Network Director (RND) before 4.5 allows jailed users to obtain root access vis a weak, hardcoded password.
|
d341f63509e0291b3ef00a43a9f873e4fd0eef598673c92e5e2b7c540e05ea5d
| 2025-08-04T16:15:33.417000Z
| 2025-09-23T19:06:10.853000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
6f9a42a68a30a07b2919465e9de0da009b98e91c9ad4d7c9095112d78d4d0818
|
CVE-2025-5988
|
A flaw was found in the Ansible aap-gateway. Cross-site request forgery (CSRF) origin checking is not done on requests from the gateway to external components, such as the controller, hub, and eda.
|
89763322eb848849b410d86987bc287bafe77d002eb00b7930f455abd15a51f3
| 2025-08-04T16:15:34.560000Z
| 2025-08-05T14:34:17.327000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
0a88726d4aaf9d9455f556025eb4df55bee45a135725b65ad546207d64465053
|
CVE-2025-8516
|
A vulnerability was found in Kingdee Cloud-Starry-Sky Enterprise Edition up to 8.2. It has been classified as problematic. Affected is the function BaseServiceFactory.getFileUploadService.deleteFileAction of the file K3Cloud\BBCMallSite\WEB-INF\lib\Kingdee.K3.O2O.Base.WebApp.jar!\kingdee\k3\o2o\base\webapp\action\FileUploadAction.class of the component IIS-K3CloudMiniApp. The manipulation of the argument filePath leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor recommends as a short-term measure to "[t]emporarily disable external network access to the Kingdee Cloud Galaxy Retail System or set up an IP whitelist for access control." The long-term remediation will be: "Install the security patch provided by the Starry Sky system, with the specific solutions being: i) Adding authentication to the vulnerable CMKAppWebHandler.ashx interface; ii) Removing the file reading function."
|
c0530608ed270fbbfcf489d8cc79369306245ffd44a2030ffc79c558715dba26
| 2025-08-04T16:15:35.373000Z
| 2025-08-05T14:34:17.327000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
f7eef82ca86c9d9e8036a8442217c43981bbd631f3035cb136d6a784f2f793ba
|
CVE-2025-8517
|
A vulnerability was detected in givanz Vvveb 1.0.6.1. Impacted is an unknown function. The manipulation results in session fixiation. The attack can be launched remotely. The exploit is now public and may be used. Upgrading to version 1.0.7 is recommended to address this issue. The patch is identified as d4b1e030066417b77d15b4ac505eed5ae7bf2c5e. You should upgrade the affected component.
|
fbddba76fe3941992c5c463fa2fbd96949430e556515d30ec3cf31b6b16560bc
| 2025-08-04T16:15:35.577000Z
| 2025-08-27T16:23:54.827000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
f34ae563f018354c7077706fea2d9fd934b549799fa24164b69c9a3bc6c1715a
|
CVE-2025-44954
|
RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build has a hardcoded SSH private key for a root-equivalent user account.
|
24804c5baae2dbd0a89a377aa0457720a58fdd4ede988eac37caea1466a65387
| 2025-08-04T17:15:29.507000Z
| 2025-08-07T17:55:17.870000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
f26187ce8c54f2cbe815f940b1166e29f295e4664edb99089d628786c9ba4082
|
CVE-2025-44957
|
Ruckus SmartZone (SZ) before 6.1.2p3 Refresh Build allows authentication bypass via a valid API key and crafted HTTP headers.
|
3513738443c661a4024182e9a11d54b2fabf4c72c6f928d8fc4acce9537e879d
| 2025-08-04T17:15:29.730000Z
| 2025-08-07T17:59:09.533000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
a3f18ebc515bea518c9a1fc4439b0f32b58f165219a4b90d07da82e08e68a728
|
CVE-2025-44958
|
RUCKUS Network Director (RND) before 4.5 stores passwords in a recoverable format.
|
821163b37a77ef834ddf8c3cb047a7086d0f2932a1896c25b155416007a115b9
| 2025-08-04T17:15:29.890000Z
| 2025-09-23T18:57:01.780000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
ba035465c7d4601fcd178de738236750215eae2686409f376522f852bfbe9b2a
|
CVE-2025-44960
|
RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build allows OS command injection via a certain parameter in an API route.
|
09306bc1cdfb52bf5c69930d303354909dcf33420d3743e460c2d0c4dbafa3d3
| 2025-08-04T17:15:30.050000Z
| 2025-08-07T17:59:12.387000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
2ba7490b4bdcdf6254e47264cda09148b15cb3dbebf3c2eccb755bf00bc8b688
|
CVE-2025-44961
|
In RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build, OS command injection can occur via an IP address field provided by an authenticated user.
|
6a7873125a465c871b3ba45a45ce7c21b92675680ab0e45871beb4717a722cab
| 2025-08-04T17:15:30.210000Z
| 2025-08-07T17:59:15.927000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
4b6c3608c6c9b65d91d999bdcee0c813420115096fc8014b0d3f8a045a05119d
|
CVE-2025-44962
|
RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build allows ../ directory traversal to read files.
|
b5c05d375a348b0e8830ad2eb5e8c3b2e86dab75a23bf575fc3f81dffda5b448
| 2025-08-04T17:15:30.367000Z
| 2025-08-07T17:59:20.320000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
4651145fc70fbc0e0d4211d3b4730d5db31408ab70478d4159f4cd880367adcd
|
CVE-2025-44963
|
RUCKUS Network Director (RND) before 4.5 allows spoofing of an administrator JWT by an attacker who knows the hardcoded value of a certain secret key.
|
5f6fd8c260778d550e65eaa1bfb6384166f55d894534ab50610768b0f7f59653
| 2025-08-04T17:15:30.540000Z
| 2025-09-23T18:48:59.567000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
3b87e55995b9f1fc051cc73d812a1e96dec718d3975d94773dc61f37573921e9
|
CVE-2025-50420
|
An issue in the pdfseparate utility of freedesktop poppler v25.04.0 allows attackers to cause an infinite recursion via supplying a crafted PDF file. This can lead to a Denial of Service (DoS).
|
2105616df1057258f94964689a0d68924118baa55d2cd3234c7bc2c7eca57e39
| 2025-08-04T17:15:30.700000Z
| 2025-10-09T17:43:54.350000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
1b1611476b59921e015950c16fcfd6d102809568e3290563e53d399485653965
|
CVE-2025-50422
|
Cairo through 1.18.4, as used in Poppler through 25.08.0, has an "unscaled->face == NULL" assertion failure for _cairo_ft_unscaled_font_fini in cairo-ft-font.c.
|
7cddf98ee8eb449ec40635a26f6e6206a8afdaae39d0fb86d9f33aa70cc425ff
| 2025-08-04T17:15:30.813000Z
| 2025-08-26T19:15:44.387000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0
| 2025-10-29T13:52:01.759408Z
|
8ec38e3817eeee046c315b565bd1ec79a50d404fdcffab0ba3e163c80d581fec
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.