346 CVEs tracked today. 22 Critical, 160 High, 155 Medium, 9 Low.
-
CVE-2025-32028
CRITICAL
CVSS 9.9
HAX CMS PHP allows you to manage your microsite universe with PHP backend. Rated critical severity (CVSS 9.9), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
PHP
File Upload
Haxcms Php
-
CVE-2025-32020
CRITICAL
CVSS 9.3
The crud-query-parser library parses query parameters from HTTP requests and converts them to database queries. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
SQLi
-
CVE-2025-31330
CRITICAL
CVSS 9.9
SAP Landscape Transformation (SLT) allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. Rated critical severity (CVSS 9.9), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
RCE
Code Injection
Sap
-
CVE-2025-30285
HIGH
CVSS 8.4
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current. Rated high severity (CVSS 8.4), this vulnerability is remotely exploitable, low attack complexity. Epss exploitation probability 26.4% and no vendor patch available.
RCE
Deserialization
Coldfusion
-
CVE-2025-30284
HIGH
CVSS 8.4
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current. Rated high severity (CVSS 8.4), this vulnerability is remotely exploitable, low attack complexity. Epss exploitation probability 24.4% and no vendor patch available.
RCE
Deserialization
Coldfusion
-
CVE-2025-30282
CRITICAL
CVSS 9.1
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Authentication vulnerability that could result in arbitrary code execution in the context of the current user. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
RCE
Authentication Bypass
Coldfusion
-
CVE-2025-30281
CRITICAL
CVSS 9.1
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary code execution. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
RCE
Information Disclosure
Authentication Bypass
Coldfusion
-
CVE-2025-30016
CRITICAL
CVSS 9.8
SAP Financial Consolidation allows an unauthenticated attacker to gain unauthorized access to the Admin account. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Sap
Authentication Bypass
-
CVE-2025-29824
HIGH
CVSS 7.8
Windows Common Log File System Driver contains a use-after-free enabling local privilege escalation, exploited in the wild in April 2025. CLFS driver vulnerabilities have become a recurring Windows kernel exploit target.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
Windows 10 1507
-
CVE-2025-29793
HIGH
CVSS 7.2
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. Epss exploitation probability 21.9% and no vendor patch available.
Microsoft
Deserialization
Sharepoint Enterprise Server
Sharepoint Server
-
CVE-2025-27486
HIGH
CVSS 7.5
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 33.1% and no vendor patch available.
Microsoft
Denial Of Service
Windows Server 2012
Windows Server 2016
Windows Server 2019
-
CVE-2025-27485
HIGH
CVSS 7.5
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 33.1% and no vendor patch available.
Microsoft
Denial Of Service
Windows Server 2012
Windows Server 2016
Windows Server 2019
-
CVE-2025-27479
HIGH
CVSS 7.5
Insufficient resource pool in Windows Kerberos allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 39.5% and no vendor patch available.
Microsoft
Authentication Bypass
Windows Server 2012
Windows Server 2016
Windows Server 2019
-
CVE-2025-27473
HIGH
CVSS 7.5
Uncontrolled resource consumption in Windows HTTP.sys allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 42.4% and no vendor patch available.
Microsoft
Denial Of Service
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-27470
HIGH
CVSS 7.5
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 39.5% and no vendor patch available.
Microsoft
Denial Of Service
Windows Server 2012
Windows Server 2016
Windows Server 2019
-
CVE-2025-27469
HIGH
CVSS 7.5
Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 42.4% and no vendor patch available.
Microsoft
Denial Of Service
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-27429
CRITICAL
CVSS 9.9
SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. Rated critical severity (CVSS 9.9), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
RCE
Code Injection
Sap
-
CVE-2025-26682
HIGH
CVSS 7.5
Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 47.0% and no vendor patch available.
Denial Of Service
Asp Net Core
Visual Studio 2022
Redhat
-
CVE-2025-26680
HIGH
CVSS 7.5
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 42.4% and no vendor patch available.
Microsoft
Denial Of Service
Windows Server 2012
Windows Server 2016
Windows Server 2019
-
CVE-2025-26673
HIGH
CVSS 7.5
Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 44.1% and no vendor patch available.
Microsoft
Denial Of Service
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-26652
HIGH
CVSS 7.5
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 42.4% and no vendor patch available.
Microsoft
Denial Of Service
Windows Server 2012
Windows Server 2016
Windows Server 2019
-
CVE-2025-26641
HIGH
CVSS 7.5
Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 42.4% and no vendor patch available.
Microsoft
Denial Of Service
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-25226
CRITICAL
CVSS 9.8
Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
SQLi
Joomla
-
CVE-2025-24447
CRITICAL
CVSS 9.1
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 28.4% and no vendor patch available.
RCE
Deserialization
Coldfusion
-
CVE-2025-24446
CRITICAL
CVSS 9.1
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
RCE
Coldfusion
-
CVE-2025-22871
CRITICAL
CVSS 9.1
The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Redhat
Suse
-
CVE-2025-21174
HIGH
CVSS 7.5
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 35.9% and no vendor patch available.
Microsoft
Denial Of Service
Windows Server 2012
Windows Server 2016
Windows Server 2019
-
CVE-2025-3363
CRITICAL
CVSS 9.8
The web service of iSherlock from HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Command Injection
-
CVE-2025-3362
CRITICAL
CVSS 9.8
The web service of iSherlock from HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Command Injection
-
CVE-2025-3361
CRITICAL
CVSS 9.8
The web service of iSherlock from HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Command Injection
-
CVE-2025-2004
CRITICAL
CVSS 9.1
The Simple WP Events plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wpe_delete_file AJAX action in all versions up to, and including,. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
WordPress
PHP
RCE
-
CVE-2024-54092
CRITICAL
CVSS 9.3
A vulnerability has been identified in Industrial Edge Device Kit - arm64 V1.17 (All versions), Industrial Edge Device Kit - arm64 V1.18 (All versions), Industrial Edge Device Kit - arm64 V1.19 (All. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Siemens
-
CVE-2024-48887
CRITICAL
CVSS 9.8
A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted request. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Fortinet
Fortiswitch
-
CVE-2024-41794
CRITICAL
CVSS 10.0
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Rated critical severity (CVSS 10.0), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
7Kt Pac1260 Data Manager Firmware
-
CVE-2024-41792
CRITICAL
CVSS 9.2
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Rated critical severity (CVSS 9.2), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Path Traversal
7Kt Pac1260 Data Manager Firmware
-
CVE-2024-41790
CRITICAL
CVSS 9.4
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Rated critical severity (CVSS 9.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Command Injection
RCE
7Kt Pac1260 Data Manager Firmware
-
CVE-2024-41789
CRITICAL
CVSS 9.4
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Rated critical severity (CVSS 9.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Command Injection
RCE
7Kt Pac1260 Data Manager Firmware
-
CVE-2024-41788
CRITICAL
CVSS 9.4
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Rated critical severity (CVSS 9.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Command Injection
RCE
7Kt Pac1260 Data Manager Firmware
-
CVE-2025-32406
HIGH
CVSS 8.6
An XXE issue in the Director NBR component in NAKIVO Backup & Replication 10.3.x through 11.0.1 before 11.0.2 allows remote attackers fetch and parse the XML response. Rated high severity (CVSS 8.6), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
XXE
-
CVE-2025-32117
HIGH
CVSS 7.1
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Widgetize Pages Light allows Reflected XSS.0. Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
XSS
-
CVE-2025-32018
HIGH
CVSS 8.0
Cursor is a code editor built for programming with AI. Rated high severity (CVSS 8.0), this vulnerability is remotely exploitable. No vendor patch available.
Path Traversal
-
CVE-2025-32017
HIGH
CVSS 8.8
Umbraco is a free and open source .NET content management system. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity.
Path Traversal
Umbraco Cms
-
CVE-2025-31498
HIGH
CVSS 8.3
c-ares is an asynchronous resolver library. Rated high severity (CVSS 8.3), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Use After Free
Memory Corruption
Information Disclosure
Redhat
Suse
-
CVE-2025-30304
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Adobe
Framemaker
-
CVE-2025-30299
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Heap Overflow
RCE
Adobe
Framemaker
-
CVE-2025-30298
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Adobe
Buffer Overflow
RCE
Stack Overflow
Framemaker
-
CVE-2025-30297
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Adobe
Framemaker
-
CVE-2025-30296
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Integer Overflow
Adobe
RCE
Framemaker
-
CVE-2025-30295
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Heap Overflow
RCE
Adobe
Framemaker
-
CVE-2025-30290
HIGH
CVSS 8.7
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to a security. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Path Traversal
Coldfusion
-
CVE-2025-30289
HIGH
CVSS 8.2
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in. Rated high severity (CVSS 8.2), this vulnerability is low attack complexity. No vendor patch available.
Command Injection
RCE
Coldfusion
-
CVE-2025-30288
HIGH
CVSS 8.2
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. Rated high severity (CVSS 8.2), this vulnerability is low attack complexity. No vendor patch available.
Authentication Bypass
Coldfusion
-
CVE-2025-30287
HIGH
CVSS 8.2
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Authentication vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 8.2), this vulnerability is low attack complexity. No vendor patch available.
RCE
Authentication Bypass
Coldfusion
-
CVE-2025-30286
HIGH
CVSS 8.4
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in. Rated high severity (CVSS 8.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Command Injection
RCE
Coldfusion
-
CVE-2025-30151
HIGH
CVSS 7.5
Shopware is an open commerce platform. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
Shopware
-
CVE-2025-30014
HIGH
CVSS 7.7
SAP Capital Yield Tax Management has directory traversal vulnerability due to insufficient path validation. Rated high severity (CVSS 7.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Sap
Path Traversal
-
CVE-2025-29986
HIGH
CVSS 8.3
Dell Common Event Enabler, version(s) CEE 9.0.0.0, contain(s) an Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Common Anti-Virus Agent (CAVA). Rated high severity (CVSS 8.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Dell
Authentication Bypass
Common Event Enabler
-
CVE-2025-29823
HIGH
CVSS 7.8
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
365 Apps
-
CVE-2025-29822
HIGH
CVSS 7.8
Incomplete list of disallowed inputs in Microsoft Office OneNote allows an unauthorized attacker to bypass a security feature locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Office
Office Long Term Servicing Channel
Onenote
-
CVE-2025-29820
HIGH
CVSS 7.8
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
365 Apps
-
CVE-2025-29816
HIGH
CVSS 7.5
Improper input validation in Microsoft Office Word allows an unauthorized attacker to bypass a security feature over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Microsoft
Authentication Bypass
365 Apps
Office
Office Long Term Servicing Channel
-
CVE-2025-29812
HIGH
CVSS 7.8
Untrusted pointer dereference in Windows Kernel Memory allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 11 22h2
Windows 11 23h2
Windows 11 24h2
-
CVE-2025-29811
HIGH
CVSS 7.8
Improper input validation in Windows Mobile Broadband allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 11 22h2
Windows 11 23h2
Windows 11 24h2
-
CVE-2025-29810
HIGH
CVSS 7.5
Improper access control in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable. No vendor patch available.
Authentication Bypass
Windows 10 1507
Windows 10 1607
Windows 10 1809
Windows 10 21h2
-
CVE-2025-29809
HIGH
CVSS 7.1
Insecure storage of sensitive information in Windows Kerberos allows an authorized attacker to bypass a security feature locally. Rated high severity (CVSS 7.1), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-29805
HIGH
CVSS 7.5
Exposure of sensitive information to an unauthorized actor in Outlook for Android allows an unauthorized attacker to disclose information over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Google
Information Disclosure
Outlook
Android
-
CVE-2025-29804
HIGH
CVSS 7.3
Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.
Authentication Bypass
Visual Studio 2022
-
CVE-2025-29802
HIGH
CVSS 7.3
Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Visual Studio 2022
-
CVE-2025-29801
HIGH
CVSS 7.8
Incorrect default permissions in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Privilege Escalation
Autoupdate
-
CVE-2025-29800
HIGH
CVSS 7.8
Improper privilege management in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Privilege Escalation
Autoupdate
-
CVE-2025-29794
HIGH
CVSS 8.8
Improper authorization in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Sharepoint Enterprise Server
Sharepoint Server
-
CVE-2025-29792
HIGH
CVSS 7.3
Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
365 Apps
-
CVE-2025-29791
HIGH
CVSS 7.8
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Memory Corruption
Authentication Bypass
365 Apps
Office
-
CVE-2025-27752
HIGH
CVSS 7.8
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
365 Apps
Office
-
CVE-2025-27751
HIGH
CVSS 7.8
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
365 Apps
-
CVE-2025-27750
HIGH
CVSS 7.8
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
365 Apps
-
CVE-2025-27749
HIGH
CVSS 7.8
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
365 Apps
-
CVE-2025-27748
HIGH
CVSS 7.8
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
365 Apps
-
CVE-2025-27747
HIGH
CVSS 7.8
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Denial Of Service
365 Apps
Office
Office Long Term Servicing Channel
-
CVE-2025-27746
HIGH
CVSS 7.8
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
365 Apps
-
CVE-2025-27745
HIGH
CVSS 7.8
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
365 Apps
-
CVE-2025-27744
HIGH
CVSS 7.8
Improper access control in Microsoft Office allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Office
-
CVE-2025-27743
HIGH
CVSS 7.8
Untrusted search path in System Center allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
System Center Data Protection Manager
System Center Operations Manager
System Center Orchestrator
System Center Service Manager
-
CVE-2025-27741
HIGH
CVSS 7.8
Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-27740
HIGH
CVSS 8.8
Weak authentication in Windows Active Directory Certificate Services allows an authorized attacker to elevate privileges over a network. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows Server 2008
Windows Server 2012
Windows Server 2016
-
CVE-2025-27739
HIGH
CVSS 7.8
Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1809
Windows 10 21h2
Windows 10 22h2
-
CVE-2025-27737
HIGH
CVSS 8.6
Improper input validation in Windows Security Zone Mapping allows an unauthorized attacker to bypass a security feature locally. Rated high severity (CVSS 8.6), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-27733
HIGH
CVSS 7.8
Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-27732
HIGH
CVSS 7.0
Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.0). No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-27731
HIGH
CVSS 7.8
Improper input validation in OpenSSH for Windows allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Ssh
Windows 10 1809
Windows 10 21h2
-
CVE-2025-27730
HIGH
CVSS 7.8
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Denial Of Service
Windows 10 1809
Windows 10 21h2
Windows 10 22h2
-
CVE-2025-27729
HIGH
CVSS 7.8
Use after free in Windows Shell allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
Windows 10 21h2
-
CVE-2025-27728
HIGH
CVSS 7.8
Out-of-bounds read in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
Windows 11 24h2
Windows Server 2025
-
CVE-2025-27727
HIGH
CVSS 7.8
Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-27492
HIGH
CVSS 7.0
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.0). No vendor patch available.
Microsoft
Information Disclosure
Race Condition
Windows 11 22h2
Windows 11 23h2
-
CVE-2025-27491
HIGH
CVSS 7.1
Use after free in Windows Hyper-V allows an authorized attacker to execute code over a network. Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
Windows 10 1507
-
CVE-2025-27490
HIGH
CVSS 7.8
Heap-based buffer overflow in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Windows 10 21h2
Windows 10 22h2
-
CVE-2025-27489
HIGH
CVSS 7.8
Improper input validation in Azure Local allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Azure Stack Hci 22H2
Azure Stack Hci 23H2
-
CVE-2025-27487
HIGH
CVSS 8.0
Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network. Rated high severity (CVSS 8.0), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Buffer Overflow
Heap Overflow
Remote Desktop Client
Windows App
Windows 10 1507
-
CVE-2025-27484
HIGH
CVSS 7.5
Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-27483
HIGH
CVSS 7.8
Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-27482
HIGH
CVSS 8.1
Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Information Disclosure
Windows Server 2016
Windows Server 2019
Windows Server 2022
Windows Server 2022 23h2
-
CVE-2025-27481
HIGH
CVSS 8.8
Stack-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Stack Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-27480
HIGH
CVSS 8.1
Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Use After Free
Memory Corruption
Denial Of Service
Windows Server 2012
Windows Server 2016
-
CVE-2025-27478
HIGH
CVSS 7.0
Heap-based buffer overflow in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.0). No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-27477
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-27476
HIGH
CVSS 7.8
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
Windows 10 1809
-
CVE-2025-27475
HIGH
CVSS 7.0
Sensitive data storage in improperly locked memory in Windows Update Stack allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.0). No vendor patch available.
Microsoft
Information Disclosure
Windows 11 22h2
Windows 11 23h2
Windows 11 24h2
-
CVE-2025-27467
HIGH
CVSS 7.8
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
Windows 10 1809
-
CVE-2025-27428
HIGH
CVSS 7.7
Due to directory traversal vulnerability, an authorized attacker could gain access to some critical information by using RFC enabled function module. Rated high severity (CVSS 7.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Sap
Authentication Bypass
Path Traversal
-
CVE-2025-27200
HIGH
CVSS 7.8
Animate versions 24.0.7, 23.0.10 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
RCE
Denial Of Service
Animate
-
CVE-2025-27199
HIGH
CVSS 7.8
Animate versions 24.0.7, 23.0.10 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Heap Overflow
RCE
Animate
-
CVE-2025-27198
HIGH
CVSS 7.8
Photoshop Desktop versions 25.12.1, 26.4.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Heap Overflow
RCE
Photoshop
-
CVE-2025-27196
HIGH
CVSS 7.8
Premiere Pro versions 25.1, 24.6.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Heap Overflow
RCE
Premiere Pro
-
CVE-2025-27195
HIGH
CVSS 7.8
Media Encoder versions 25.1, 24.6.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Heap Overflow
RCE
Media Encoder
-
CVE-2025-27194
HIGH
CVSS 7.8
Media Encoder versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Media Encoder
-
CVE-2025-27193
HIGH
CVSS 7.8
Bridge versions 14.1.5, 15.0.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Heap Overflow
RCE
Bridge
-
CVE-2025-27183
HIGH
CVSS 7.8
After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
After Effects
-
CVE-2025-27182
HIGH
CVSS 7.8
After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
After Effects
-
CVE-2025-27083
HIGH
CVSS 7.2
Authenticated command injection vulnerabilities exist in the AOS-10 GW and AOS-8 Controller/Mobility Conductor web-based management interface. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Command Injection
Arubaos
-
CVE-2025-27082
HIGH
CVSS 7.2
Arbitrary File Write vulnerabilities exist in the web-based management interface of both the AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
File Upload
Arubaos
-
CVE-2025-26688
HIGH
CVSS 7.8
Stack-based buffer overflow in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Stack Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-26687
HIGH
CVSS 7.5
Use after free in Windows Win32K - GRFX allows an unauthorized attacker to elevate privileges over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
Office
-
CVE-2025-26686
HIGH
CVSS 7.5
Sensitive data storage in improperly locked memory in Windows TCP/IP allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-26679
HIGH
CVSS 7.8
Use after free in RPC Endpoint Mapper Service allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Denial Of Service
Windows 10 1507
Windows 10 1607
-
CVE-2025-26678
HIGH
CVSS 8.4
Improper access control in Windows Defender Application Control (WDAC) allows an unauthorized attacker to bypass a security feature locally. Rated high severity (CVSS 8.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Windows 10 1809
Windows 10 21h2
Windows 10 22h2
-
CVE-2025-26675
HIGH
CVSS 7.8
Out-of-bounds read in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
Windows 10 21h2
Windows 10 22h2
-
CVE-2025-26674
HIGH
CVSS 7.8
Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Windows 10 1809
Windows 10 21h2
-
CVE-2025-26671
HIGH
CVSS 8.1
Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
Windows Server 2008
-
CVE-2025-26670
HIGH
CVSS 8.1
Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
Windows 10 1507
-
CVE-2025-26669
HIGH
CVSS 8.8
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-26668
HIGH
CVSS 7.5
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-26666
HIGH
CVSS 7.8
Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Windows 10 1809
Windows 10 21h2
-
CVE-2025-26665
HIGH
CVSS 7.0
Sensitive data storage in improperly locked memory in Windows upnphost.dll allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.0). No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-26663
HIGH
CVSS 8.1
Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
Windows 10 1507
-
CVE-2025-26649
HIGH
CVSS 7.0
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.0). No vendor patch available.
Microsoft
Information Disclosure
Race Condition
Windows 11 22h2
Windows 11 23h2
-
CVE-2025-26648
HIGH
CVSS 7.8
Sensitive data storage in improperly locked memory in Windows Kernel allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Information Disclosure
Windows 10 1507
-
CVE-2025-26647
HIGH
CVSS 8.8
Improper input validation in Windows Kerberos allows an authorized attacker to elevate privileges over a network. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows Server 2008
Windows Server 2012
Windows Server 2016
-
CVE-2025-26642
HIGH
CVSS 7.8
Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
365 Apps
Access
-
CVE-2025-26640
HIGH
CVSS 7.0
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.0). No vendor patch available.
Microsoft
Denial Of Service
Windows 10 1809
Windows 10 21h2
Windows 10 22h2
-
CVE-2025-26639
HIGH
CVSS 7.8
Integer overflow or wraparound in Windows USB Print Driver allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Windows 10 21h2
Windows 10 22h2
-
CVE-2025-26628
HIGH
CVSS 7.3
Insufficiently protected credentials in Azure Local Cluster allows an authorized attacker to disclose information locally. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Azure Local Cluster
-
CVE-2025-25254
HIGH
CVSS 7.2
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in FortiWeb version 7.6.2 and below, version 7.4.6 and below, 7.2 all versions, 7.0 all. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Path Traversal
Fortinet
Fortiweb
-
CVE-2025-25227
HIGH
CVSS 7.5
Insufficient state checks lead to a vector that allows to bypass 2FA checks. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Joomla
-
CVE-2025-24074
HIGH
CVSS 7.8
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1809
Windows 10 21h2
Windows 10 22h2
-
CVE-2025-24073
HIGH
CVSS 7.8
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-24062
HIGH
CVSS 7.8
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 21h2
Windows 10 22h2
Windows 11 22h2
-
CVE-2025-24060
HIGH
CVSS 7.8
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1809
Windows 10 21h2
Windows 10 22h2
-
CVE-2025-24058
HIGH
CVSS 7.8
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1809
Windows 10 21h2
Windows 10 22h2
-
CVE-2025-23186
HIGH
CVSS 8.5
In certain conditions, SAP NetWeaver Application Server ABAP allows an authenticated attacker to craft a Remote Function Call (RFC) request to restricted destinations, which can be used to expose. Rated high severity (CVSS 8.5), this vulnerability is remotely exploitable. No vendor patch available.
RCE
Code Injection
Sap
-
CVE-2025-22466
HIGH
CVSS 8.2
Reflected XSS in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows a remote unauthenticated attacker to obtain admin privileges. Rated high severity (CVSS 8.2), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Ivanti
XSS
Endpoint Manager
-
CVE-2025-22461
HIGH
CVSS 7.2
SQL injection in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows a remote authenticated attacker with admin privileges to achieve code execution. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
RCE
SQLi
Ivanti
Endpoint Manager
-
CVE-2025-22458
HIGH
CVSS 7.8
DLL hijacking in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows an authenticated attacker to escalate to System. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Ivanti
Privilege Escalation
Endpoint Manager
-
CVE-2025-21222
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-21221
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-21205
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-21204
HIGH
CVSS 7.8
Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-21191
HIGH
CVSS 7.0
Time-of-check time-of-use (toctou) race condition in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.0). No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-20946
HIGH
CVSS 8.8
Improper handling of exceptional conditions in pairing specific bluetooth devices in Galaxy Watch Bluetooth pairing prior to SMR Apr-2025 Release 1 allows local attackers to pair with specific. Rated high severity (CVSS 8.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Wear Os
-
CVE-2025-20936
HIGH
CVSS 8.8
Improper access control in HDCP trustlet prior to SMR Apr-2025 Release 1 allows local attackers with shell privilege to escalate their privileges to root. Rated high severity (CVSS 8.8), this vulnerability is low attack complexity. No vendor patch available.
Privilege Escalation
Android
-
CVE-2025-3431
HIGH
CVSS 7.5
The ZoomSounds - WordPress Wave Audio Player with Playlist plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 6.91 via the 'dzsap_download' action. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
WordPress
Information Disclosure
Zoomsounds
PHP
-
CVE-2025-3289
HIGH
CVSS 8.5
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based memory buffer overflow. Rated high severity (CVSS 8.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Rockwell
Buffer Overflow
RCE
Arena
-
CVE-2025-3288
HIGH
CVSS 8.5
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. Rated high severity (CVSS 8.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Rockwell
Buffer Overflow
RCE
Arena
-
CVE-2025-3287
HIGH
CVSS 8.5
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based memory buffer overflow. Rated high severity (CVSS 8.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Rockwell
Buffer Overflow
RCE
Arena
-
CVE-2025-3286
HIGH
CVSS 8.5
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. Rated high severity (CVSS 8.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Rockwell
Buffer Overflow
RCE
Arena
-
CVE-2025-3285
HIGH
CVSS 8.5
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. Rated high severity (CVSS 8.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Rockwell
Buffer Overflow
RCE
Arena
-
CVE-2025-3064
HIGH
CVSS 8.8
The WPFront User Role Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.2.1. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
WordPress
CSRF
Privilege Escalation
PHP
-
CVE-2025-2829
HIGH
CVSS 8.5
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. Rated high severity (CVSS 8.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Rockwell
Buffer Overflow
RCE
Arena
-
CVE-2025-2807
HIGH
CVSS 8.8
The Motors - Car Dealership & Classified Listings Plugin plugin for WordPress is vulnerable to arbitrary plugin installations due to a missing capability check in the. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. This Missing Authorization vulnerability could allow attackers to access resources or perform actions without proper authorization checks.
RCE
WordPress
Authentication Bypass
Motors Car Dealer Classifieds Listing
PHP
-
CVE-2025-2526
HIGH
CVSS 8.8
The Streamit theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.2. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
Authentication Bypass
Privilege Escalation
PHP
-
CVE-2025-2525
HIGH
CVSS 8.8
The Streamit theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'st_Authentication_Controller::edit_profile' function in all versions up to, and. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
RCE
File Upload
PHP
-
CVE-2025-2293
HIGH
CVSS 8.5
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. Rated high severity (CVSS 8.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Rockwell
Buffer Overflow
RCE
Arena
-
CVE-2025-2288
HIGH
CVSS 8.5
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. Rated high severity (CVSS 8.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Rockwell
Buffer Overflow
RCE
Arena
-
CVE-2025-2287
HIGH
CVSS 8.5
A local code execution vulnerability exists in the Rockwell Automation Arena® due to an uninitialized pointer. Rated high severity (CVSS 8.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Rockwell
RCE
Arena
-
CVE-2025-2286
HIGH
CVSS 8.5
A local code execution vulnerability exists in the Rockwell Automation Arena® due to an uninitialized pointer. Rated high severity (CVSS 8.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Rockwell
RCE
Arena
-
CVE-2025-2285
HIGH
CVSS 8.5
A local code execution vulnerability exists in the Rockwell Automation Arena® due to an uninitialized pointer. Rated high severity (CVSS 8.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Rockwell
RCE
Arena
-
CVE-2025-1095
HIGH
CVSS 8.8
IBM Personal Communications v14 and v15 include a Windows service that is vulnerable to local privilege escalation (LPE). Rated high severity (CVSS 8.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
IBM
Privilege Escalation
Personal Communications
Windows
-
CVE-2024-55354
HIGH
CVSS 8.8
Lucee before 5.4.7.3 LTS and 6 before 6.1.1.118, when an attacker can place files on the server, is vulnerable to a protection mechanism failure that can let an attacker run code that would be. Rated high severity (CVSS 8.8), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2024-54024
HIGH
CVSS 7.2
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiIsolator before version 2.4.6 allows a privileged attacker with. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Command Injection
Fortinet
Fortiisolator
-
CVE-2024-41793
HIGH
CVSS 7.7
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Rated high severity (CVSS 7.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
7Kt Pac1260 Data Manager Firmware
-
CVE-2024-26013
HIGH
CVSS 7.5
A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Information Disclosure
Fortinet
Fortianalyzer
Fortimanager
Fortios
-
CVE-2024-12556
HIGH
CVSS 8.7
Prototype Pollution in Kibana can lead to code injection via unrestricted file upload combined with path traversal. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. This Improperly Controlled Modification of Object Prototype Attributes (Prototype Pollution) vulnerability could allow attackers to modify object prototypes to inject properties affecting application logic.
Prototype Pollution
Path Traversal
Elastic
File Upload
Kibana
-
CVE-2025-32414
MEDIUM
CVSS 5.6
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. Rated medium severity (CVSS 5.6), this vulnerability is no authentication required. Public exploit code available and no vendor patch available.
Python
Buffer Overflow
Libxml2
Redhat
Suse
-
CVE-2025-32413
MEDIUM
CVSS 6.4
Vulnerability-Lookup before 2.7.1 allows stored XSS via a user bio in website/web/views/user.py. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
XSS
-
CVE-2025-32279
MEDIUM
CVSS 4.3
Missing Authorization vulnerability in Shahjada Live Forms.8.5. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
-
CVE-2025-32211
MEDIUM
CVSS 6.5
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Broadstreet Broadstreet allows Stored XSS.51.2. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
XSS
-
CVE-2025-32164
MEDIUM
CVSS 6.5
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in maennchen1.de m1.DownloadList.DownloadList: from n/a through 0.21. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-32036
MEDIUM
CVSS 4.2
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Rated medium severity (CVSS 4.2), this vulnerability is remotely exploitable, no authentication required.
Microsoft
Information Disclosure
Dotnetnuke
-
CVE-2025-32025
MEDIUM
CVSS 6.9
bep/imagemeta is a Go library for reading EXIF, IPTC and XMP image meta data from JPEG, TIFF, PNG, and WebP files. Rated medium severity (CVSS 6.9), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
Suse
-
CVE-2025-32024
MEDIUM
CVSS 6.9
bep/imagemeta is a Go library for reading EXIF, IPTC and XMP image meta data from JPEG, TIFF, PNG, and WebP files. Rated medium severity (CVSS 6.9), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
Suse
-
CVE-2025-31333
MEDIUM
CVSS 4.3
SAP S4CORE OData meta-data property is vulnerable to data tampering, due to which entity set could be externally modified by an attacker causing low impact on integrity of the application. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Sap
Information Disclosure
-
CVE-2025-31332
MEDIUM
CVSS 6.6
Due to insecure file permissions in SAP BusinessObjects Business Intelligence Platform, an attacker who has local access to the system could modify files potentially disrupting operations or cause. Rated medium severity (CVSS 6.6), this vulnerability is low attack complexity. No vendor patch available.
Sap
Information Disclosure
Businessobjects Business Intelligence Platform
-
CVE-2025-31331
MEDIUM
CVSS 4.3
SAP NetWeaver allows an attacker to bypass authorization checks, enabling them to view portions of ABAP code that would normally require additional validation. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Sap
Authentication Bypass
-
CVE-2025-30671
MEDIUM
CVSS 6.5
Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Microsoft
Null Pointer Dereference
Denial Of Service
Meeting Software Development Kit
Rooms
-
CVE-2025-30670
MEDIUM
CVSS 6.5
Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Microsoft
Null Pointer Dereference
Denial Of Service
Meeting Software Development Kit
Rooms
-
CVE-2025-30309
MEDIUM
CVSS 5.5
XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Xmp Toolkit Software Development Kit
-
CVE-2025-30308
MEDIUM
CVSS 5.5
XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Xmp Toolkit Software Development Kit
-
CVE-2025-30307
MEDIUM
CVSS 5.5
XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Xmp Toolkit Software Development Kit
-
CVE-2025-30306
MEDIUM
CVSS 5.5
XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Xmp Toolkit Software Development Kit
-
CVE-2025-30305
MEDIUM
CVSS 5.5
XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Xmp Toolkit Software Development Kit
-
CVE-2025-30303
MEDIUM
CVSS 5.5
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Adobe
Framemaker
-
CVE-2025-30302
MEDIUM
CVSS 5.5
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Adobe
Framemaker
-
CVE-2025-30301
MEDIUM
CVSS 5.5
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Null Pointer Dereference
Adobe
Denial Of Service
Framemaker
-
CVE-2025-30300
MEDIUM
CVSS 5.5
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Null Pointer Dereference
Adobe
Denial Of Service
Framemaker
-
CVE-2025-30294
MEDIUM
CVSS 6.8
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. Rated medium severity (CVSS 6.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Authentication Bypass
Coldfusion
-
CVE-2025-30293
MEDIUM
CVSS 6.8
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. Rated medium severity (CVSS 6.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Authentication Bypass
Coldfusion
-
CVE-2025-30292
MEDIUM
CVSS 6.1
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
XSS
Coldfusion
-
CVE-2025-30291
MEDIUM
CVSS 5.5
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Information Exposure vulnerability that could result in a security feature bypass. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Coldfusion
-
CVE-2025-30280
MEDIUM
CVSS 6.9
A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.21.0), Mendix Runtime V10.12 (All versions < V10.12.16), Mendix Runtime V10.18 (All versions < V10.18.5), Mendix Runtime. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-30150
MEDIUM
CVSS 5.5
Shopware 6 is an open commerce platform based on Symfony Framework and Vue. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Information Disclosure
Shopware
-
CVE-2025-30017
MEDIUM
CVSS 4.4
Due to a missing authorization check, an authenticated attacker could upload a file as a template for solution documentation in SAP Solution Manager 7.1. Rated medium severity (CVSS 4.4), this vulnerability is low attack complexity. No vendor patch available.
Sap
Authentication Bypass
-
CVE-2025-30015
MEDIUM
CVSS 4.1
Due to incorrect memory address handling in ABAP SQL of SAP NetWeaver and ABAP Platform (Application Server ABAP), an authenticated attacker with high privileges could execute certain forms of SQL. Rated medium severity (CVSS 4.1), this vulnerability is remotely exploitable. No vendor patch available.
Sap
Memory Corruption
Buffer Overflow
-
CVE-2025-30013
MEDIUM
CVSS 6.7
SAP ERP BW Business Content is vulnerable to OS Command Injection through certain function modules. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
RCE
Command Injection
Code Injection
Sap
-
CVE-2025-30000
MEDIUM
CVSS 5.4
A vulnerability has been identified in Siemens License Server (SLS) (All versions < V4.3). Rated medium severity (CVSS 5.4). No vendor patch available.
Siemens
Privilege Escalation
-
CVE-2025-29999
MEDIUM
CVSS 5.4
A vulnerability has been identified in Siemens License Server (SLS) (All versions < V4.3). Rated medium severity (CVSS 5.4). No vendor patch available.
Siemens
RCE
Privilege Escalation
-
CVE-2025-29985
MEDIUM
CVSS 6.5
Dell Common Event Enabler, version(s) CEE 9.0.0.0, contain(s) an Initialization of a Resource with an Insecure Default vulnerability in the Common Anti-Virus Agent (CAVA). Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Dell
Authentication Bypass
Common Event Enabler
-
CVE-2025-29821
MEDIUM
CVSS 5.5
Improper input validation in Dynamics Business Central allows an authorized attacker to disclose information locally. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Dynamics 365 Business Central 2023
Dynamics 365 Business Central 2024
Dynamics 365 Business Central 2025
-
CVE-2025-29819
MEDIUM
CVSS 6.2
External control of file name or path in Azure Portal Windows Admin Center allows an unauthorized attacker to disclose information locally. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows Admin Center
Windows
-
CVE-2025-29808
MEDIUM
CVSS 5.5
Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows Server 2022
Windows
-
CVE-2025-27742
MEDIUM
CVSS 5.5
Out-of-bounds read in Windows NTFS allows an unauthorized attacker to disclose information locally. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-27738
MEDIUM
CVSS 6.5
Improper access control in Windows Resilient File System (ReFS) allows an authorized attacker to disclose information over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-27736
MEDIUM
CVSS 5.5
Exposure of sensitive information to an unauthorized actor in Windows Power Dependency Coordinator allows an authorized attacker to disclose information locally. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1607
Windows 10 1809
Windows 10 21h2
-
CVE-2025-27735
MEDIUM
CVSS 6.0
Insufficient verification of data authenticity in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to bypass a security feature locally. Rated medium severity (CVSS 6.0), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-27474
MEDIUM
CVSS 6.5
Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows Server 2008
Windows Server 2012
Windows Server 2016
-
CVE-2025-27472
MEDIUM
CVSS 5.4
Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature over a network. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Windows 10 1507
Windows Server 2012
Windows
-
CVE-2025-27471
MEDIUM
CVSS 5.9
Sensitive data storage in improperly locked memory in Microsoft Streaming Service allows an unauthorized attacker to deny service over a network. Rated medium severity (CVSS 5.9), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-27442
MEDIUM
CVSS 4.6
Cross site scripting in some Zoom Workplace Apps may allow an unauthenticated user to conduct a loss of integrity via adjacent network access. Rated medium severity (CVSS 4.6), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
CSRF
XSS
Meeting Software Development Kit
Rooms
Rooms Controller
-
CVE-2025-27441
MEDIUM
CVSS 4.6
Cross site scripting in some Zoom Workplace Apps may allow an unauthenticated user to conduct a loss of integrity via adjacent network access. Rated medium severity (CVSS 4.6), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
CSRF
XSS
Meeting Software Development Kit
Rooms
Rooms Controller
-
CVE-2025-27437
MEDIUM
CVSS 4.3
A Missing Authorization Check vulnerability exists in the Virus Scanner Interface of SAP NetWeaver Application Server ABAP. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Sap
Information Disclosure
Authentication Bypass
-
CVE-2025-27435
MEDIUM
CVSS 4.2
Under specific conditions and prerequisites, an unauthenticated attacker could access customer coupon codes exposed in the URL parameters of the Coupon Campaign URL in SAP Commerce. Rated medium severity (CVSS 4.2), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Sap
Authentication Bypass
-
CVE-2025-27205
MEDIUM
CVSS 5.4
Adobe Experience Manager Screens versions FP11.3 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Adobe
XSS
Experience Manager Screens
-
CVE-2025-27204
MEDIUM
CVSS 5.5
After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
After Effects
-
CVE-2025-27202
MEDIUM
CVSS 5.5
Animate versions 24.0.7, 23.0.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Animate
-
CVE-2025-27201
MEDIUM
CVSS 5.5
Animate versions 24.0.7, 23.0.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Animate
-
CVE-2025-27191
MEDIUM
CVSS 5.3
Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Adobe
Authentication Bypass
Commerce
Commerce B2b
Magento
-
CVE-2025-27190
MEDIUM
CVSS 5.3
Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Adobe
Authentication Bypass
Commerce
Commerce B2b
Magento
-
CVE-2025-27189
MEDIUM
CVSS 4.3
Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could be exploited to cause a. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity.
Adobe
CSRF
Commerce B2b
-
CVE-2025-27188
MEDIUM
CVSS 4.3
Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. This Incorrect Authorization vulnerability could allow attackers to bypass authorization checks to access restricted resources.
Adobe
Authentication Bypass
Privilege Escalation
Commerce
Commerce B2b
-
CVE-2025-27187
MEDIUM
CVSS 5.5
After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
After Effects
-
CVE-2025-27186
MEDIUM
CVSS 5.5
After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
After Effects
-
CVE-2025-27185
MEDIUM
CVSS 5.5
After Effects versions 25.1, 24.6.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Null Pointer Dereference
Denial Of Service
After Effects
-
CVE-2025-27184
MEDIUM
CVSS 5.5
After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
After Effects
-
CVE-2025-27085
MEDIUM
CVSS 4.9
Multiple vulnerabilities exist in the web-based management interface of AOS-10 GW and AOS-8 Controller/Mobility Conductor. Rated medium severity (CVSS 4.9), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Path Traversal
Arubaos
-
CVE-2025-27084
MEDIUM
CVSS 5.4
A vulnerability in the Captive Portal of an AOS-10 GW and AOS-8 Controller/Mobility Conductor could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
XSS
Arubaos
-
CVE-2025-27079
MEDIUM
CVSS 6.0
A vulnerability in the file creation process on the command line interface of AOS-8 Instant and AOS-10 AP could allow an authenticated remote attacker to perform remote code execution (RCE). Rated medium severity (CVSS 6.0), this vulnerability is low attack complexity. No vendor patch available.
Command Injection
RCE
-
CVE-2025-27078
MEDIUM
CVSS 6.5
A vulnerability in a system binary of AOS-8 Instant and AOS-10 AP could allow an authenticated remote attacker to inject commands into the underlying operating system while using the CLI. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Command Injection
-
CVE-2025-26681
MEDIUM
CVSS 6.7
Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. Rated medium severity (CVSS 6.7). No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
Windows 10 21h2
-
CVE-2025-26676
MEDIUM
CVSS 6.5
Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Windows Server 2008
Windows Server 2012
Windows Server 2016
-
CVE-2025-26672
MEDIUM
CVSS 6.5
Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-26667
MEDIUM
CVSS 6.5
Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows Server 2008
Windows Server 2012
Windows Server 2016
-
CVE-2025-26664
MEDIUM
CVSS 6.5
Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Windows Server 2008
Windows Server 2012
Windows Server 2016
-
CVE-2025-26657
MEDIUM
CVSS 5.3
SAP KMC WPC allows an unauthenticated attacker to remotely retrieve usernames by a simple parameter query which could expose sensitive information causing low impact on confidentiality of the. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Sap
Authentication Bypass
-
CVE-2025-26654
MEDIUM
CVSS 6.8
SAP Commerce Cloud (Public Cloud) does not allow to disable unencrypted HTTP (port 80) entirely, but instead allows a redirect from port 80 to 443 (HTTPS). Rated medium severity (CVSS 6.8), this vulnerability is no authentication required. No vendor patch available.
Sap
Information Disclosure
-
CVE-2025-26653
MEDIUM
CVSS 4.7
SAP NetWeaver Application Server ABAP does not sufficiently encode user-controlled inputs, leading to Stored Cross-Site Scripting (XSS) vulnerability. Rated medium severity (CVSS 4.7), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Sap
XSS
-
CVE-2025-26651
MEDIUM
CVSS 6.5
Exposed dangerous method or function in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. Epss exploitation probability 39.8% and no vendor patch available.
Microsoft
Information Disclosure
Windows 11 22h2
Windows 11 23h2
Windows 11 24h2
-
CVE-2025-26644
MEDIUM
CVSS 5.1
Automated recognition mechanism with inadequate detection or handling of adversarial input perturbations in Windows Hello allows an unauthorized attacker to perform spoofing locally. Rated medium severity (CVSS 5.1), this vulnerability is no authentication required. No vendor patch available.
Microsoft
Authentication Bypass
Windows 10 1809
Windows 10 21h2
Windows 10 22h2
-
CVE-2025-26637
MEDIUM
CVSS 6.8
Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Windows 10 1507
Windows 10 1607
Windows 10 22h2
-
CVE-2025-26635
MEDIUM
CVSS 6.5
Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Windows 10 1809
Windows 10 21h2
Windows 10 22h2
-
CVE-2025-25013
MEDIUM
CVSS 6.5
Improper restriction of environment variables in Elastic Defend can lead to exposure of sensitive information such as API keys and tokens via automatic transmission of unfiltered environment. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
Elastic
-
CVE-2025-25002
MEDIUM
CVSS 6.8
Insertion of sensitive information into log file in Azure Local Cluster allows an authorized attacker to disclose information over an adjacent network. Rated medium severity (CVSS 6.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Azure Local Cluster
-
CVE-2025-22465
MEDIUM
CVSS 6.1
Reflected XSS in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows a remote unauthenticated attacker to execute arbitrary javascript in a victim's browser. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Ivanti
XSS
Endpoint Manager
-
CVE-2025-22464
MEDIUM
CVSS 6.1
An untrusted pointer dereference vulnerability in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows an attacker with local access to write arbitrary data into memory. Rated medium severity (CVSS 6.1), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Ivanti
Endpoint Manager
-
CVE-2025-22459
MEDIUM
CVSS 4.8
Improper certificate validation in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows a remote unauthenticated attacker to intercept limited traffic between clients and. Rated medium severity (CVSS 4.8), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Information Disclosure
Ivanti
Endpoint Manager
-
CVE-2025-22017
MEDIUM
CVSS 5.5
In the Linux kernel, the following vulnerability has been resolved: devlink: fix xa_alloc_cyclic() error handling In case of returning 1 from xa_alloc_cyclic() (wrapping) ERR_PTR(1) will be returned,. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. This NULL Pointer Dereference vulnerability could allow attackers to crash the application by dereferencing a null pointer.
Null Pointer Dereference
Linux
Denial Of Service
Linux Kernel
Redhat
-
CVE-2025-22016
MEDIUM
CVSS 5.5
In the Linux kernel, the following vulnerability has been resolved: dpll: fix xa_alloc_cyclic() error handling In case of returning 1 from xa_alloc_cyclic() (wrapping) ERR_PTR(1) will be returned,. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. This NULL Pointer Dereference vulnerability could allow attackers to crash the application by dereferencing a null pointer.
Null Pointer Dereference
Linux
Denial Of Service
Linux Kernel
Redhat
-
CVE-2025-22015
MEDIUM
CVSS 5.5
In the Linux kernel, the following vulnerability has been resolved: mm/migrate: fix shmem xarray update during migration A shmem folio can be either in page cache or in swap cache, but not at the. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. This NULL Pointer Dereference vulnerability could allow attackers to crash the application by dereferencing a null pointer.
Null Pointer Dereference
Linux
Denial Of Service
Linux Kernel
Redhat
-
CVE-2025-22014
MEDIUM
CVSS 5.5
In the Linux kernel, the following vulnerability has been resolved: soc: qcom: pdr: Fix the potential deadlock When some client process A call pdr_add_lookup() to add the look up for the service and. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity.
Information Disclosure
Linux
Linux Kernel
Redhat
Suse
-
CVE-2025-22013
MEDIUM
CVSS 5.5
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state There are several problems with the way hyp code lazily saves the. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity.
Redhat
Linux
Denial Of Service
Linux Kernel
Suse
-
CVE-2025-22012
MEDIUM
CVSS 5.5
In the Linux kernel, the following vulnerability has been resolved: Revert "arm64: dts: qcom: sdm845: Affirm IDR0.CCTW on apps_smmu" There are reports that the pagetable walker cache coherency is not. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity.
Linux
Lenovo
Denial Of Service
Linux Kernel
Redhat
-
CVE-2025-22011
MEDIUM
CVSS 5.5
In the Linux kernel, the following vulnerability has been resolved: ARM: dts: bcm2711: Fix xHCI power-domain During s2idle tests on the Raspberry CM4 the VPU firmware always crashes on xHCI. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity.
Linux
Denial Of Service
Linux Kernel
Redhat
Suse
-
CVE-2025-22010
MEDIUM
CVSS 5.5
In the Linux kernel, the following vulnerability has been resolved: RDMA/hns: Fix soft lockup during bt pages loop Driver runs a for-loop when allocating bt pages and mapping them with buffer pages. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity.
Information Disclosure
Linux
Linux Kernel
Redhat
Suse
-
CVE-2025-22009
MEDIUM
CVSS 5.5
In the Linux kernel, the following vulnerability has been resolved: regulator: dummy: force synchronous probing Sometimes I get a NULL pointer dereference at boot time in kobject_get() with the. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity.
Null Pointer Dereference
Linux
Denial Of Service
Linux Kernel
Redhat
-
CVE-2025-22008
MEDIUM
CVSS 5.5
In the Linux kernel, the following vulnerability has been resolved: regulator: check that dummy regulator has been probed before using it Due to asynchronous driver probing there is a chance that the. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity.
Information Disclosure
Linux
Linux Kernel
Redhat
Suse
-
CVE-2025-21203
MEDIUM
CVSS 6.5
Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Windows Server 2008
Windows Server 2012
Windows Server 2016
-
CVE-2025-21197
MEDIUM
CVSS 6.5
Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-20951
MEDIUM
CVSS 5.1
Improper verification of intent by broadcast receiver vulnerability in Galaxy Store prior to version 4.5.90.7 allows local attackers to write arbitrary files with the privilege of Galaxy Store. Rated medium severity (CVSS 5.1), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Galaxy Store
-
CVE-2025-20950
MEDIUM
CVSS 4.0
Use of implicit intent for sensitive communication in SamsungNotes prior to version 4.4.26.45 allows local attackers to access sensitive information. Rated medium severity (CVSS 4.0), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Notes
Samsung
-
CVE-2025-20948
MEDIUM
CVSS 5.5
Out-of-bounds read in enrollment with cdsp frame secfr trustlet prior to SMR Apr-2025 Release 1 allows local privileged attackers to read out-of-bounds memory. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Android
-
CVE-2025-20947
MEDIUM
CVSS 5.5
Improper handling of insufficient permission or privileges in ClipboardService prior to SMR Apr-2025 Release 1 allows local attackers to access image files across multiple users. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Android
-
CVE-2025-20945
MEDIUM
CVSS 4.0
Improper access control in Galaxy Watch prior to SMR Apr-2025 Release 1 allows local attackers to access sensitive information of Galaxy watch. Rated medium severity (CVSS 4.0), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Wear Os
-
CVE-2025-20944
MEDIUM
CVSS 6.2
Out-of-bounds read in parsing audio data in libsavsac.so prior to SMR Apr-2025 Release 1 allows local attackers to read out-of-bounds memory. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Android
-
CVE-2025-20943
MEDIUM
CVSS 6.4
Out-of-bounds write in secfr trustlet prior to SMR Apr-2025 Release 1 allows local privileged attackers to cause memory corruption. Rated medium severity (CVSS 6.4). No vendor patch available.
Memory Corruption
Buffer Overflow
Android
-
CVE-2025-20942
MEDIUM
CVSS 4.4
Improper Verification of Intent by Broadcast Receiver in DeviceIdService prior to SMR Apr-2025 Release 1 allows local attackers to reset OAID. Rated medium severity (CVSS 4.4), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Android
-
CVE-2025-20941
MEDIUM
CVSS 6.2
Improper access control in InputManager to SMR Apr-2025 Release 1 allows local attackers to access the scancode of specific input device. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Android
-
CVE-2025-20940
MEDIUM
CVSS 4.0
Improper handling of insufficient permission in Samsung Device Health Manager Service prior to SMR Apr-2025 Release 1 allows local attackers to access provider in SDMHS. Rated medium severity (CVSS 4.0), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Samsung
-
CVE-2025-20939
MEDIUM
CVSS 5.4
Improper authorization in wireless download protocol in Galaxy Watch prior to SMR Apr-2025 Release 1 allows physical attackers to update device unique identifier of Watch devices. Rated medium severity (CVSS 5.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Wear Os
-
CVE-2025-20938
MEDIUM
CVSS 5.5
Improper access control in SamsungContacts prior to SMR Apr-2025 Release 1 allows local attackers to access protected data in SamsungContacts. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Android
Samsung
-
CVE-2025-20935
MEDIUM
CVSS 5.5
Improper handling of insufficient permission or privileges in ClipboardService prior to SMR Apr-2025 Release 1 allows local attackers to access files with system privilege. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-20934
MEDIUM
CVSS 5.5
Improper access control in Sticker Center prior to SMR Apr-2025 Release 1 allows local attackers to access image files with system privilege. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Android
-
CVE-2025-3437
MEDIUM
CVSS 4.3
The Motors - Car Dealership & Classified Listings Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in the. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. This Missing Authorization vulnerability could allow attackers to access resources or perform actions without proper authorization checks.
WordPress
PHP
Authentication Bypass
Motors Car Dealer Classifieds Listing
-
CVE-2025-3436
MEDIUM
CVSS 6.5
The coreActivity: Activity Logging for WordPress plugin for WordPress is vulnerable to SQL Injection via the 'order' and 'orderby' parameters in all versions up to, and including, 2.7 due to. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
SQLi
PHP
-
CVE-2025-3433
MEDIUM
CVSS 6.1
The Advanced Advertising System plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 1.3.1. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Open Redirect
WordPress
PHP
-
CVE-2025-3432
MEDIUM
CVSS 6.4
The AAWP Obfuscator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'data-aawp-web' parameter in all versions up to, and including, 1.0 due to insufficient input. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
XSS
PHP
-
CVE-2025-3430
MEDIUM
CVSS 4.9
The 3DPrint Lite plugin for WordPress is vulnerable to SQL Injection via the 'printer_text' parameter in all versions up to, and including, 2.1.3.6 due to insufficient escaping on the user supplied. Rated medium severity (CVSS 4.9), this vulnerability is remotely exploitable, low attack complexity.
WordPress
SQLi
3Dprint Lite
PHP
-
CVE-2025-3429
MEDIUM
CVSS 4.9
The 3DPrint Lite plugin for WordPress is vulnerable to SQL Injection via the 'material_text' parameter in all versions up to, and including, 2.1.3.6 due to insufficient escaping on the user supplied. Rated medium severity (CVSS 4.9), this vulnerability is remotely exploitable, low attack complexity.
WordPress
SQLi
3Dprint Lite
PHP
-
CVE-2025-3428
MEDIUM
CVSS 4.9
The 3DPrint Lite plugin for WordPress is vulnerable to SQL Injection via the 'coating_text' parameter in all versions up to, and including, 2.1.3.6 due to insufficient escaping on the user supplied. Rated medium severity (CVSS 4.9), this vulnerability is remotely exploitable, low attack complexity.
WordPress
SQLi
3Dprint Lite
PHP
-
CVE-2025-3427
MEDIUM
CVSS 4.9
The 3DPrint Lite plugin for WordPress is vulnerable to SQL Injection via the 'infill_text' parameter in all versions up to, and including, 2.1.3.6 due to insufficient escaping on the user supplied. Rated medium severity (CVSS 4.9), this vulnerability is remotely exploitable, low attack complexity.
WordPress
SQLi
3Dprint Lite
PHP
-
CVE-2025-3413
MEDIUM
CVSS 5.3
A vulnerability has been found in opplus springboot-admin up to a2d5310f44fd46780a8686456cf2f9001ab8f024 and classified as critical. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Deserialization
Springboot Admin
-
CVE-2025-3412
MEDIUM
CVSS 5.3
A vulnerability, which was classified as critical, was found in mymagicpower AIAS 20250308. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
SSRF
Java
Aias
-
CVE-2025-3411
MEDIUM
CVSS 5.3
A vulnerability, which was classified as critical, has been found in mymagicpower AIAS 20250308.java. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
SSRF
Java
Aias
-
CVE-2025-3410
MEDIUM
CVSS 5.3
A vulnerability classified as critical was found in mymagicpower AIAS 20250308. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
File Upload
Java
Aias
-
CVE-2025-3409
MEDIUM
CVSS 5.3
A vulnerability classified as critical has been found in Nothings stb up to f056911. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Stb Image H
Suse
-
CVE-2025-3408
MEDIUM
CVSS 5.3
A vulnerability was found in Nothings stb up to f056911. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Stb Image H
Suse
-
CVE-2025-3407
MEDIUM
CVSS 5.3
A vulnerability was found in Nothings stb up to f056911. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Stb Image H
Suse
-
CVE-2025-3406
MEDIUM
CVSS 5.3
A vulnerability was found in Nothings stb up to f056911. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Stb Image H
Suse
-
CVE-2025-3405
MEDIUM
CVSS 5.3
A vulnerability was found in FCJ Venture Builder appclientefiel 3.0.27. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-3403
MEDIUM
CVSS 5.1
A vulnerability was found in Vivotek NVR ND8422P, NVR ND9525P and NVR ND9541P 2.4.0.204/3.3.0.104/4.2.0.101. Rated medium severity (CVSS 5.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-3402
MEDIUM
CVSS 5.3
A vulnerability was found in Seeyon Zhiyuan Interconnect FE Collaborative Office Platform 5.5.2 and classified as critical.js%70. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Microsoft
SQLi
Fe Collaborative Office Platform
-
CVE-2025-3401
MEDIUM
CVSS 6.9
A vulnerability has been found in ESAFENET CDG 5.6.3.154.205_20250114 and classified as critical. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
SQLi
Cdg
-
CVE-2025-3400
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, was found in ESAFENET CDG 5.6.3.154.205_20250114. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
SQLi
Cdg
-
CVE-2025-3399
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, has been found in ESAFENET CDG 5.6.3.154.205_20250114. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
SQLi
Cdg
-
CVE-2025-3398
MEDIUM
CVSS 5.3
A vulnerability classified as critical was found in lenve VBlog up to 1.0.0. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
Java
Vblog
-
CVE-2025-3397
MEDIUM
CVSS 5.3
A vulnerability classified as problematic has been found in YzmCMS 7.1. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
XSS
Yzmcms
-
CVE-2025-3393
MEDIUM
CVSS 5.1
A vulnerability was found in mrcen springboot-ucan-admin up to 5f35162032cbe9288a04e429ef35301545143509. Rated medium severity (CVSS 5.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
XSS
-
CVE-2025-3392
MEDIUM
CVSS 5.1
A vulnerability was found in hailey888 oa_system up to 2025.01.01 and classified as problematic. Rated medium severity (CVSS 5.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
XSS
Java
Oa System
-
CVE-2025-3391
MEDIUM
CVSS 5.1
A vulnerability has been found in hailey888 oa_system up to 2025.01.01 and classified as problematic. Rated medium severity (CVSS 5.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
XSS
Java
Oa System
-
CVE-2025-3390
MEDIUM
CVSS 5.1
A vulnerability, which was classified as problematic, was found in hailey888 oa_system up to 2025.01.01. Rated medium severity (CVSS 5.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
XSS
Java
Oa System
-
CVE-2025-3389
MEDIUM
CVSS 5.1
A vulnerability, which was classified as problematic, has been found in hailey888 oa_system up to 2025.01.01.java of the component Backend. Rated medium severity (CVSS 5.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
XSS
Java
Oa System
-
CVE-2025-3364
MEDIUM
CVSS 6.7
The SSH service of PowerStation from HGiga has a Chroot Escape vulnerability, allowing attackers with root privileges to bypass chroot restrictions and access the entire file system. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Privilege Escalation
-
CVE-2025-2883
MEDIUM
CVSS 5.3
The Accept SagePay Payments Using Contact Form 7 plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0 through the publicly accessible. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
WordPress
Information Disclosure
PHP
-
CVE-2025-2882
MEDIUM
CVSS 5.3
The GreenPay(tm) by Green.Money plugin for WordPress is vulnerable to Sensitive Information Exposure in versions between 3.0.0 and 3.0.9 through the publicly accessible phpinfo.php script. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
WordPress
Information Disclosure
PHP
-
CVE-2025-2876
MEDIUM
CVSS 5.3
The MelaPress Login Security and MelaPress Login Security Premium plugins for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'monitor_admin_actions'. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Missing Authorization vulnerability could allow attackers to access resources or perform actions without proper authorization checks.
WordPress
Authentication Bypass
Melapress Login Security
PHP
-
CVE-2025-2808
MEDIUM
CVSS 5.4
The Motors - Car Dealership & Classified Listings Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Phone Number parameter in all versions up to, and including, 1.4.63. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. This Cross-Site Scripting (XSS) vulnerability could allow attackers to inject malicious scripts into web pages viewed by other users.
WordPress
XSS
Motors Car Dealer Classifieds Listing
PHP
-
CVE-2025-2568
MEDIUM
CVSS 5.3
The Vayu Blocks - Gutenberg Blocks for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized access and modification of data due to missing capability checks on the. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
WordPress
Authentication Bypass
PHP
-
CVE-2025-2519
MEDIUM
CVSS 6.5
The Sreamit theme for WordPress is vulnerable to arbitrary file downloads in all versions up to, and including, 4.0.1. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
Path Traversal
PHP
-
CVE-2025-0361
MEDIUM
CVSS 4.3
During an annual penetration test conducted on behalf of Axis Communications, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed for unauthenticated username. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
Axis Os
Axis Os 2024
-
CVE-2024-54025
MEDIUM
CVSS 6.7
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiIsolator CLI before version 2.4.6 allows a privileged attacker to. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Command Injection
Fortinet
Fortiisolator
-
CVE-2024-52981
MEDIUM
CVSS 4.9
An issue was discovered in Elasticsearch, where a large recursion using the Well-KnownText formatted string with nested GeometryCollection objects could cause a stackoverflow. Rated medium severity (CVSS 4.9), this vulnerability is remotely exploitable, low attack complexity. This Uncontrolled Resource Consumption vulnerability could allow attackers to cause denial of service by exhausting system resources.
Elastic
Denial Of Service
Elasticsearch
-
CVE-2024-52980
MEDIUM
CVSS 6.5
A flaw was discovered in Elasticsearch, where a large recursion using the innerForbidCircularReferences function of the PatternBank class could cause the Elasticsearch node to crash. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. This Uncontrolled Resource Consumption vulnerability could allow attackers to cause denial of service by exhausting system resources.
Elastic
Denial Of Service
Elasticsearch
-
CVE-2024-52974
MEDIUM
CVSS 6.5
An issue has been identified where a specially crafted request sent to an Observability API could cause the kibana server to crash. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. This Uncontrolled Resource Consumption vulnerability could allow attackers to cause denial of service by exhausting system resources.
Elastic
Denial Of Service
Kibana
-
CVE-2024-52962
MEDIUM
CVSS 5.3
An Improper Output Neutralization for Logs vulnerability [CWE-117] in FortiAnalyzer version 7.6.1 and below, version 7.4.5 and below, version 7.2.8 and below, version 7.0.13 and below and. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Fortimanager
Fortianalyzer
-
CVE-2024-47261
MEDIUM
CVSS 4.3
51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
Axis Os
Axis Os 2022
Axis Os 2024
-
CVE-2024-46671
MEDIUM
CVSS 6.2
An Incorrect User Management vulnerability [CWE-286] in FortiWeb version 7.6.2 and below, version 7.4.6 and below, version 7.2.10 and below, version 7.0.11 and below widgets dashboard may allow an. Rated medium severity (CVSS 6.2), this vulnerability is remotely exploitable. No vendor patch available.
Information Disclosure
Fortinet
Fortiweb
-
CVE-2024-41796
MEDIUM
CVSS 6.9
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
CSRF
7Kt Pac1260 Data Manager Firmware
-
CVE-2024-41795
MEDIUM
CVSS 6.9
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
CSRF
7Kt Pac1260 Data Manager Firmware
-
CVE-2024-41791
MEDIUM
CVSS 6.9
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
7Kt Pac1260 Data Manager Firmware
-
CVE-2024-13820
MEDIUM
CVSS 5.3
The Melhor Envio plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.15.9 via the 'run' function, which uses a hardcoded hash. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
WordPress
Information Disclosure
-
CVE-2025-32035
LOW
CVSS 2.6
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Rated low severity (CVSS 2.6), this vulnerability is remotely exploitable.
Microsoft
Information Disclosure
Dotnetnuke
-
CVE-2025-32026
LOW
CVSS 3.8
Element Web is a Matrix web client built using the Matrix React SDK. Rated low severity (CVSS 3.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-30166
LOW
CVSS 1.8
Pimcore's Admin Classic Bundle provides a Backend UI for Pimcore. Rated low severity (CVSS 1.8), this vulnerability is remotely exploitable. This Cross-Site Scripting (XSS) vulnerability could allow attackers to inject malicious scripts into web pages viewed by other users.
XSS
Admin Classic Bundle
-
CVE-2025-27443
LOW
CVSS 2.8
Insecure default variable initialization in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a loss of integrity via local access. Rated low severity (CVSS 2.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Meeting Software Development Kit
Rooms
Rooms Controller
-
CVE-2025-27192
LOW
CVSS 2.7
Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Insufficiently Protected Credentials vulnerability that could lead to a security feature. Rated low severity (CVSS 2.7), this vulnerability is remotely exploitable, low attack complexity.
Adobe
Authentication Bypass
Commerce
Commerce B2b
Magento
-
CVE-2025-22855
LOW
CVSS 2.7
An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Fortinet FortiClient before 7.4.1 may allow the EMS administrator to send messages. Rated low severity (CVSS 2.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
XSS
Fortinet
Forticlientems
-
CVE-2025-3416
LOW
CVSS 3.7
A flaw was found in OpenSSL's handling of the properties argument in certain functions. Rated low severity (CVSS 3.7), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Use After Free
Memory Corruption
OpenSSL
Information Disclosure
-
CVE-2024-50565
LOW
CVSS 3.1
A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through. Rated low severity (CVSS 3.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Information Disclosure
Fortinet
Fortiweb
Fortivoice
Fortiproxy
-
CVE-2024-32122
LOW
CVSS 2.3
A storing passwords in a recoverable format in Fortinet FortiOS 7.4.0 through 7.4.8, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions allows attacker to information. Rated low severity (CVSS 2.3), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Fortinet
Fortios